Chapter 4: Criminals
Criminal elements exist at every level of society and in every operational environment (OE). Their presence, whatever their level of capabilities, adds to the complexity of any OE. They may be intertwined with irregular forces and possibly with regular military and/or paramilitary forces of a nation-state. However, they may also pursue their criminal activities independent of such other actors.
Contents
[hide]- 1 Characteristics
- 2 Motivations
- 3 Criminal Organizations
- 4 Command and Control
- 5 Criminal Activities
Characteristics
Some individuals, groups, and activities are criminal or illegal only because they violate laws established by a recognized governing authority. Others may violate moral or ethical standards of a given society or of the international community.
Note. In some OEs, the threat is more criminal than military or paramilitary in nature. Insurgents, guerrillas, or other armed groups often use or mimic established criminal enterprises and practices to move contraband, raise funds, or otherwise further their goals and objectives.
Criminal activity is a category of violence that is enmeshed in the daily life of most people in both urban and rural areas. However, criminal activity thrives in areas where there is instability and lack of government control or law enforcement. The actions of insurgents and guerrillas further erode stability and effective governance, creating more opportunities for criminal pursuits. Sometimes, given those opportunities, insurgent or guerrillas themselves turn to crime—either to sustain themselves or for personal profit. It may be difficult to distinguish crime from ethnic feuds, ideological and theological extremism, or other elements of a culture that incite insurgency or guerrilla warfare.
Governing authorities often characterize insurgents and guerrillas as “bandits.” The reason for this is that their activities in opposing the governing authority and sustaining themselves are illegal (from the government perspective). Acts of subversion may be against the law (that is, criminal) even if not violent.
Scope of Operations
Criminal organizations are normally independent of nation-state control. Large-scale organizations often extend beyond national boundaries to operate regionally or worldwide. Large-scale organizations may have the capability to adversely affect legitimate political, military, and judicial organizations. However, individual criminals or small-scale criminal organizations (gangs) typically do not. Still, any criminal organization can affect such government organizations and/or military operations by becoming affiliated with the irregular OPFOR or with military forces of another nation-state.
Unless a criminal organization is in league with government officials, it must operate in ungoverned or poorly governed areas. Otherwise, the governing authority would interfere with the criminal activity. In today’s world, the ungoverned area may be virtual—in the Internet and cyberspace. Criminal organizations can draw on virtual sanctuaries such as websites, chat rooms, and blogs.
Criminal organizations desire a space where they can conduct their activities unconstrained by a government. They may seek to create or maintain a region where there is no governmental control or only governmental control that they can co-opt. Such an area allows them sufficient latitude to operate and discourage rival criminal enterprises. From this base area, they can generate more and more violence and instability over wider sections of the political map.
Some criminal organizations can generate instability and insecurity within a state or across borders. They can become partners with insurgents in order to further their criminal ends. A criminal organization takes on the characteristics of an insurgency when it uses subversion and violence to negate law enforcement efforts. Some criminal organizations may seek to co-opt political power through corruption and intimidation. The more they seek freedom of action, the more they inhibit state sovereignty. A criminal organization may create its own form of “government” by providing protection and enforcing its will on the populace. If it can challenge the governing authority’s control beyond the local level of government, it in effect becomes an insurgency unto itself, although its ends are materially focused rather than ideological.
Relationships With Other Organizations and Actors
Criminal organizations may have some type of relationship with guerrilla and/or insurgent organizations or other actors, based on similar or shared goals and/or interests. The nature of the shared goal or interest determines the tenure and type of relationship and the degree of affiliation. Any affiliation depends on the needs of the criminal organization at a particular time. To criminals, any cooperation with other actors is viewed through the lens of profitability. They may actually oppose other actors whose activities degrade their criminal enterprises.
Note. Criminals and criminal organizations, both armed and unarmed, may be considered noncombatants as long as they are neutral. However, they may be considered as combatants if they become affiliated with regular military or irregular forces. In the latter case, they can be considered part of the irregular OPFOR.
Irregular Forces
By mutual agreement, or when their interests coincide, criminal organizations may become affiliated with insurgents and/or guerrillas controlling and operating in the same area. Such allies can provide security and protection against government forces or other common enemies. They can also provide support to the criminal organization’s activities. In exchange, the criminal organization may provide financial assistance, advanced technologies, or weapons.
Mutual interests of criminals, insurgents, and/or guerrillas can include preventing extraregional or local government forces from interfering in their respective spheres. The amount of mutual protection depends on the size and sophistication of each organization and its level of influence on the government or the local population.
On behalf of a criminal organization, insurgents or guerrillas can conduct—
- Diversionary actions.
- Reconnaissance and early warning.
- Money laundering.
- Smuggling.
- Transportation.
- Civic actions.
Criminal organizations may not be part of an insurgency. However, their activities—such as theft, hijackings, kidnappings, and smuggling—can further undermine the governing authority. Insurgent organizations often link themselves to criminal networks to obtain funding and logistics support. In some cases, insurgent networks and criminal networks become indistinguishable. Many insurgent organizations are more similar to organized crime in their organizational structure and relations with the populace than they are to military units.
Note. If an insurgent organization creates a shadow government, criminals may co-opt elements of that government for their own benefit or reach agreements for mutual benefit.
Nation-state Military or Paramilitary Forces
At times, criminal organizations might also be affiliated with nation-state military and/or paramilitary actors. In time of war, a state may encourage and materially support criminal actions that contribute to the breakdown of civil control in a neighboring country. Regular, reserve, and militia forces of a state can maintain various relationships with criminal organizations. Special-purpose forces (SPF) can support criminal organizations and possibly conduct operations in conjunction with them.
Local Populace
Criminal organizations may conduct civic actions to gain and maintain support of the populace. A grateful public can provide valuable security and support functions. The local citizenry may willingly provide ample intelligence collection, counterintelligence, and security support. Such support can also be the result of bribery, extortion, or coercion. For example, a criminal organization might use bribery or extortion to induce members of the local populace to act as couriers or otherwise support its activities. It might also coerce a businessperson into running a front company on its behalf.
Private Security Companies
Large criminal organizations may hire private security contractors (PSCs) to guard key facilities. PSCs can also provide bodyguards for a criminal leader or conduct surveillance or a search at a site prior to his arrival.
Personnel
In most countries and cultures, criminals fall into the lower orders of social groups. However, there are some cases in which the criminals are well known and receive a degree of respect for their adherence to traditional social values and their public social works (civic actions).
Criminals may or may not be armed. For instance, individuals who perform money laundering or operate front companies might not be armed. Individual criminals or gangs might be affiliated with insurgents or guerrillas and still perform support functions that do not involve weapons. Conversely, some criminals are armed noncombatants who are not part of or affiliated with any military or paramilitary organization. Some minor criminals may use their weapons for activities such as extortion and theft. They might even steal from local government or extraregional forces, to make a profit. Opportunists may decide to hijack a vehicle or a convoy by force of arms.
Individual criminals may be completely neutral or have leanings for either side, or several sides. At least at the outset, they may not be members of or directly affiliated with the irregular OPFOR. However, since some of them are already armed, they could easily become combatants, if their situation charges. While some noncombatants are normally unarmed, there is always the potential for them to take up arms in reaction to developments in the OE and their perception of the actions of local governing authorities or an extraregional force.
Note. Most criminals (especially noncombatants) are not irregular forces or part of the irregular OPFOR. However, they are included in this TC because of their relationships and interactions with the irregular OPFOR. Their criminal acts can add to the general instability caused by the irregular OPFOR.
Motivations
Criminals, unlike insurgents or guerrillas, are seldom driven by any political or religious ideology. They exist to make money or to wield power. However, some criminal organizations may align themselves with insurgents or guerrillas if their interests are mutually supportable. Criminal organizations may even become affiliated with military or paramilitary forces of a nation-state if their interests coincide.
Note. Insurgents, guerrillas, or nation-states may espouse a rigid religious or political ideology. However, they may set aside those principles when using the drug trade or other criminal activities to finance their operations.
Profit
The primary motivation of criminals is making as much money as possible with as little risk as possible. To make a profit, they may fill a need or want with otherwise unavailable products or provide services that are illegal. To mitigate risk, they may buy influence with politicians and police officials. Failing that, they may eliminate those law enforcement and legal system personnel who interfere with their activities, as well as criminal competitors.
The enemies of criminal organizations are any political, military, legal, or judicial institutions that impede their actions and interfere with their ability to make a profit. However, there are other groups that conduct drug-trafficking or other illegal actions as a means to purchase weapons and finance other paramilitary activities. Criminals may tolerate or cooperate with such groups as long as they do not appear to be competitors or infringe on their own ability to make a profit. A criminal organization may sell or trade information to a military or paramilitary organization, for profit or mutual benefit.
Power
Individual criminals and criminal organizations commit crimes not only for money, but also to gain power and prestige. Actions such as assassination, murder, and maiming are intended to demonstrate the criminal organization’s power and control. That power may be over public officials, persons it cannot otherwise control or intimidate, criminal competitors, or people disloyal to the organization.
Larger criminal networks and transnational criminal organizations conduct criminal activities on a scale that can threaten whole societies and/or the international community. They can render governments corrupt and ineffective. They often begin to control ungoverned territory within a nation-state, acquire political power in poorly governed regions, and eventually vie with the governing authority for influence in government-controlled space. They also look for ways to exert power and influence internationally.
Criminal Organizations
Very few crimes can be carried out by an individual criminal. Therefore, some form of organization is normally required. It may be a group of two or three individuals or a larger, more sophisticated organization. The higher the level of organization, the greater the potential for profit and power. Criminal organizations may not change their structure in wartime, unless wartime conditions favor or dictate different types of criminal action or support activities.
Weapons and equipment vary based on type and scale of criminal activity. Criminal organizations at the higher end of the scale can take on the characteristics of a paramilitary organization—either for self- protection or as a private army for hire. Criminals may have the best technology, equipment, and weapons available, simply because they have the money to buy them.
Criminal organizations generally fall into three types: gangs, large-scale criminal networks, and transnational criminal organizations. Some gangs and criminal networks develop into larger criminal networks and possibly into transnational criminal organizations. Thus, the lines of separation are not always clear-cut. However, there are some basic differences in how these three types are structured and how they operate.
Gangs
Some criminals may form loosely associated organizations with no true formal structure. These small gangs are a concern to local law enforcement, but normally are not a threat to legitimate institutions. Nevertheless, their often unpredictable acts of violence can destabilize the social and political environment. Smaller gangs tend to have loose, unsophisticated leadership focused on turf protection, gang loyalty, and local, petty crime (such as theft or small-scale drug sales). Even when many gangs with various leaders operate in the same areas, they may or may not interrelate with each other.
These smaller gangs are not irregular forces, but their impact on the local populace can be significant and may actually assist irregular forces. Even small gangs may become affiliated with insurgents or guerrillas if they stand to gain profit or power.
Some smaller gangs may develop into larger gangs or into large-scale criminal networks. This can happen in two ways. A small gang may grow into a larger organization, or several gangs may (willingly or forcibly) be joined to form a larger organization.
Large-scale Criminal Networks
Gangs may develop into large-scale criminal networks. At this level, they expand illicit business, increase profits, and typically focus on trafficking and market protection. These networks and the gangs that comprise them also continue with the traditional sources of illegal income. However, they are much more versatile, flexible, and able to adapt to various opportunities. The large number of criminal organizations loosely associated with one another is able to exploit more opportunities with a variety of means. Large-scale criminal networks can include any or all of the actions listed under “Criminal Activities” later in this chapter.
Note. The term criminal network more closely captures the loose structure of many large criminal groups that do have an enduring association but are more fluid and adaptable than the more specific terms syndicate or cartel imply.
Most criminal networks are loosely structured and function primarily because each participant is pursuing his own interests. Such a network is not necessarily a formally structured, hierarchical organization with one individual controlling and running the operation. Rather, it may be a loose-knit, intricate web of individuals or groups selected for their particular skills. However, they frequently continue to operate independently until the network needs their skills. The network can quickly assemble the appropriate resources to take advantage of opportunities for specific illegal activities and then release these assets between jobs. This reduces exposure to detection and keeps individuals from having too much information about the overall operation.
Even when there are strong vertical links, there can still be a great deal of autonomy among the numerous small gangs that make up the network. The hierarchy may receive payments from those lower in the organization, but each gang is free to pursue its own criminal enterprises when the larger organization does not require its services. The small gangs may still operate relatively independently (and perhaps competitively). They do not necessarily share key information with the larger structure. Even the highest- level leadership may not be aware of all operations.
These criminal networks use violence as a means to create and protect their market as well as marginalize and control their competition. They seek to control or weaken state security institutions. They often begin to dominate community life within large areas of a nation-state. Criminal groups at this level may begin to develop overtly political agendas to improve their market share. They may overtly challenge state security and sovereignty. They may use subversion and violence as political interference to negate law enforcement efforts directed against them.
Criminal networks that control local or regional markets may have ties to and frequently do business with criminal organizations in other regions or other countries. They do so when they need wider networks of customers, fences, money-laundering expertise, access to technologies, and other essentials for an effective criminal venture.
Some criminal networks may develop into larger criminal networks or into transnational criminal organizations. In some cases, a smaller network may simply grow into a larger organization. In other cases, several networks may willingly join to form a larger organization. In still other cases, smaller organizations may be forced (by coercion or by circumstances) to become part of a larger organization.
Transitional Criminal Organizations
Some criminal organizations develop into sophisticated transnational criminal organizations. These organizations may have ambitious economic and political agendas. They often begin to fill the power vacuum in ungoverned or poorly governed regions within a nation-state and to challenge government control of other regions. This provides the transnational organization with security and freedom of movement to pursue its criminal enterprises. In some cases, the organization becomes a de facto insurgency with ends focused on the material rather than ideological goals. Actions can include any or all of the items listed under “Criminal Activities” later in this chapter—such as drug and arms trafficking, money laundering, and terrorism. Transnational criminal organizations develop their own transit routes for illegal shipments and develop their own access to contraband.
Transnational criminal organizations take advantage of increased opportunities for profit and power that are found internationally. Globalization is not limited to legal trade and commerce. Criminals in various countries can cooperate in criminal ventures that take place across several countries. The increasing ease and effectiveness of global communications plays a significant role in arranging criminal ventures and in laundering the proceeds.
For example, smuggling is a big business that requires international organization. Illegal substances or legal goods less expensive elsewhere are smuggled across state boundaries. (Drugs are the most lucrative of smuggled items.) A significant part of the profits may go to suppliers and associates in other countries, and profits may be laundered using international financial systems.
Also contributing to the international nature of crime is the increased movement of people across borders. Businesses, both legitimate and illegitimate, benefit from expanding global travel. Another aspect is movement of people forced from their homes by war or political persecution. Others move in order to seek the opportunity to build a better life for themselves and their families. The vast majority of these people are not criminals. However, the size of the movement provides perfect cover for those who are connected to transnational criminal organizations. Some migrants avoid formal channels and pay smugglers to get them into another country.
Command and Control
Criminal organizations (especially gangs and criminal networks) tend to have a lose structure. However, there is always some vertical link between lower-level subordinates and the organization’s leadership. When smaller organizations develop into larger criminal organizations by growth or by forcible joining, the vertical links are more likely to take the form of a relatively strong hierarchical leadership structure. However, when smaller organizations willingly become part of a larger organization, there is more likely to be a rather loose leadership structure. The following paragraphs describe some of the levels that may exist even in a loose hierarchical structure.
Senior Leaders
As a general rule, transnational criminal organizations tend to be highly centralized with senior leaders exerting control through a rigid chain of command. Gangs and criminal networks vary much more in their leadership structure. Some are highly organized, while others may be near anarchic with no central leadership.
Compared to gangs, the leadership of large-scale criminal networks tends to be more centralized, but with a loose hierarchical structure. However, there are exceptions. For example, some networks (such as drug cartels or crime syndicates) may be tightly organized with a rigid hierarchy. Some networks may resemble a business enterprise with specially qualified individuals on the operational side, while others supply the support services.
Different groups have varying titles for their leaders. Such titles may include boss, number one, chief, father, or simply leader (in various languages).
Intermediate Leaders
Intermediate leaders are the “middle management” of criminal organizations. Each of these is the ranking member of his particular part of a larger organization. Again, titles vary from organization to organization. Examples are sub-boss, underboss, street boss, or franchise leader. Those intermediate leaders who, in the view of their organization, lead a crew of “soldiers,” may have military-like titles (such as sergeant, lieutenant, captain, or brigadier). Regardless of the title, the mission is the same:
- Turn orders into reality and make money.
- Ensure loyalty and punish those who get out of line.
- Avoid arrest and prosecution.
- Eliminate or intimidate the competition.
Specialized and Technical Supporters
All organizations have specialists. These are people who maintain a very high level of expertise in one or two areas necessary for the success of the organization. In criminal organizations, this traditionally includes such persons as—
- Accountants.
- Defense attorneys.
- Counselors.
- Professional assassins.
- Explosives experts.
- Counterfeiters.
- Smugglers.
- Pilots.
- Drivers.
In today’s strategic and operational environments, it also includes—
- Hackers.
- Computer programmers.
- Telecommunications specialists.
- Weapons experts.
- Human traffickers.
Field Operatives
At the lowest level of the criminal organization is the field operative. That is the man on the street, willing to commit crimes for money, power, and prestige. These people may be full members (made men), aspiring members (prospects), or those who want to be seen with the organization (hang-around, associates). The titles for field operatives may include soldier, warrior, legman, or simply member. Whatever their title, they are still criminals within a larger organization and will be the face of the organization that most of the populace see.
Passive Supporters
In many cases, there are individuals or groups who provide passive support to criminal organizations for any number of reasons. Some see the organization as a defense against another group or corrupt government officials. Some have familial connections. Some see neighborhood, community, or country loyalty embodied in the criminal organization. Some are merely concerned about their own financial security or material gain.
Criminal Activities
Criminals use many and varied tactics and techniques. Some of these methods overlap with one another. The activities typically include an objective to make fiscal profit and/or achieve influence.
Security
Security is crucial for criminal organizations. They may use the highest degree of sophistication available to conduct intelligence collection and counterintelligence activities. These activities are a priority and can be well funded. Intelligence sources may extend to high levels within government and law- enforcement agencies. The local populace may willingly provide ample intelligence collection, counterintelligence, and security support. Intelligence and security can also be the result of bribery, extortion, or coercion.
Most members of criminal organizations are capable of protecting themselves and their assets. Typically, they carry small-caliber weapons, such as handguns, pistols, rifles, and shotguns. They are lightly armed out of necessity or convenience, not for lack of resources. When greater force of arms is necessary to control people, protect vital resources, or obtain information, these organizations typically have members who can use heavier arms, such as machineguns and assault weapons. Large criminal organizations may hire PSCs to conduct surveillance, provide personal security for leaders, or guard key facilities.
Theft
Theft is the taking of another person’s property without that person’s permission or consent with the intent to deprive the rightful owner of it. Thus, theft is an overarching term that covers various crimes against property such as burglary, embezzlement, larceny, looting, robbery, and fraud. (See also identity theft and intellectual property theft, both under Cyber Crime.)
Fraud
A fraud is an intentional deception made for personal gain and/or to damage another individual or entity. Defrauding people or entities of money or valuables is a common purpose of fraud. Fraud can include—
- Ponzi schemes.
- Insider trading.
- Embezzlement.
- Insurance scams.
- Money laundering.
- Forgery.
Fraud can also include cyber crimes such as—
- Identity theft.
- Copyright infringement.
Racketeering
A racket is a fraudulent scheme, enterprise, or activity. It is usually an illegitimate business made workable by bribery or intimidation. A racketeer is one who extorts money or advantages by threats of violence, by blackmail, or by unlawful interference with business or employment. Therefore, racketeering overlaps with bribery, intimidation, and extortion.
In racketeering, a criminal organization typically creates or perpetuates a problem or the perception of a problem for which it then offers a solution, for a fee. The intent is to engender continual patronage. In the traditional example of a protection racket, the racketeer informs a store owner that a substantial monthly fee will be required in exchange for protection. The “protection” provided takes the form of the absence of damage inflicted upon the store or its employees by the racket itself. Another example is malicious software (malware) that pretends to be detecting spyware or other infections on a computer and offers to download a cleaning utility for a fee. In actuality, the distributor of the malware is also the maker of the cleaning utility. (This aspect of racketeering overlaps with the category of cyber crime, discussed below.) In addition to protection rackets, racketeering can also involve numbers rackets or illegal lottery.
Racketeering can also include seemingly legitimate businesses that provide a front for illegal activity such as buying and selling illegal merchandise. Loan sharking is another form of racketeering in which a criminal offers loans at extremely high interest rates to borrowers who cannot qualify for loans from legitimate sources. The debtor faces violence or other criminal means to cause harm if the debt is not paid.
Black markets fall under racketeering as illegal businesses. These can include traded goods and services such as biological organs, transportation providers, illegal drugs, prostitution, weaponry, alcohol, tobacco, currency, and fuel. Black markets tend to flourish in most countries during wartime, due to rationing, and impact commodities such as food, fuel, rubber, and metal.
Gambling
In most societies, the act of gambling is in itself not illegal. What becomes illegal is an illicit business based on gambling (also called gaming). It is illegal because either—
- It is conducted in a fraudulent manner.
- The governing authority has outlawed it.
- The gambling enterprise fails to share all its profits with the governing authority.
Gambling in the form of a numbers racket or illegal lottery is a form of racketeering. Internet gambling is a form of cyber crime.
Many types of gambling have been, or still are, illegal in some places. Hence, criminals may be the only operators of some games. Even when a governing authority legalizes some gambling ventures, it may be difficult to keep criminals from becoming involved, due to the huge potential for profits. Besides gaming operations recognized and (sometimes poorly) regulated by the state, there are many other gambling opportunities in which criminals may be involved.
Gambling is often associated with other types of crime. Operators of legal gambling establishments may receive kickbacks for allowing money laundering. Gambling operations earn large amounts of cash and present particular opportunities for skimming and money laundering. Aside from skimming profits from a legalized gambling enterprise, skimming can also occur with the granting of credit, which can lead into loan sharking. In particular, problem gamblers who need money for gambling may easily fall prey to loan sharks. Compulsive gambling can also lead to crimes such as embezzlement, robbery, check forgery, and fraud.
Prostitution
Prostitution is the practice of indulging in sexual relations for money. As a criminal enterprise, it also involves a criminal or criminal organization that profits from the commercial sex act. Prostitutes may also profit from the venture, although the criminal organization gets its cut. However, prostitution may be linked to human trafficking, in which case the criminals get all the profits.
Extortion
Extortion is the act of obtaining money, materiel, information, or support by force or intimidation. Criminal organizations use extortion to obtain information or cooperation or to protect members. Examples of extortion include—
- Intimidating politicians to vote in a manner favorable to the criminal organization.
- Intimidating judges to free an organization member.
- Forcing a farmer to grow drug-producing crops.
- Extorting money from local businesses in exchange for protection, which means not harming the business or its members.
- Using death threats against an individual or his family to cause him to provide information or resources.
- Intimidating other people not to take action against the criminal organization.
- Using information warfare (INFOWAR) methods to create and maintain fear caused by extortion.
Bribery
Bribery is giving money or other favors to influence someone. Criminals give money to people in power who make or influence decisions. For example, bribes to law-enforcement officials can cause them to have their patrols avoid a criminal organization’s transit routes. If the organization is unable to bribe someone, it employs harsher methods, such as extortion, assassination, or murder, to gain cooperation.
Arson
Arson is maliciously burning another person’s dwelling, structures, or property. This may be done to as punishment for noncompliance with internal rules of criminal organizations. It may be the result of not paying the criminal organization for “protection.” It may also be done on a for-hire basis or as a means to inflict terror on a targeted person or group.
Hijacking
Hijacking is stealing or commandeering a conveyance. Criminals may conduct a hijacking to produce a spectacular hostage situation. Sometimes criminals may hijack a conveyance as a means of escape; in that case, the criminals may eliminate any unneeded people and materiel, such as hostages or baggage.
Kidnapping
Kidnapping is an abduction or transportation of a person or group by force. The person is kept in false imprisonment (confinement without legal authority). This may be done for ransom or in furtherance of another crime (such as human trafficking or hostage taking). This type of crime has become very popular with criminal organizations, and the methods vary by region. Kidnapping flourishes particularly in fragile or failed states and regions in conflict, as drug traffickers and other criminal organizations fill the vacuum left by governing authority.
The risk in kidnapping is relatively lower than in hostage taking. This is primarily because the criminals take the kidnapped victim to a location controlled by the criminal organization. The criminals then make demands and are willing to hold a victim for a long time, if necessary.
Hostage Taking
Hostage taking is typically an overt seizure of a person or persons to gain publicity, concessions, or ransom. Unlike kidnapping, where usually a prominent individual is taken, the hostages are usually not well known figures. Criminals attempt to hold hostages in a neutral or friendly area. The planning and execution of a hostage taking are similar to those of a kidnapping or hijacking. However, criminals may also take hostages as an expedient measure when they have difficulty exiting a crime scene.
Murder
Murder is the unlawful killing of another human being without justification or excuse. Murder is perhaps the single most serious criminal offense. Criminal organizations use murder as an enforcement tool and as a method of generating revenue in murder-for-hire schemes.
Assassination
An assassination is the murder (usually of a prominent person) by a sudden and/or secret attack. It is usually prompted by religious, ideological, political, or military motives, but may be done for payment. Criminals and criminal organizations may use an assassination—
- For monetary gain.
- To exert terror.
- To display power.
- To exact revenge on a public official.
- To eliminate people they cannot intimidate.
- To punish people who have left the criminal organization.
Maiming
Maiming is a deliberate act to mutilate, disfigure, or severely wound a person so as to cause lasting damage. Maiming can involve assault and battery on a person with intent to inflict serious injury. Other methods include—
- Male castration.
- Female genital mutilation.
- Burning or branding.
- Forcible tattooing.
- Cutting off limbs.
- Removal of tongue, eyes, or ears.
- Throwing a corrosive acid or alkali to cause blindness or scarring.
The person maimed is an outward sign of the criminal organization’s power and control. A criminal organization often uses or threatens maiming—
- To enforce order within the organization.
- To collect debts.
- For extortion.
- As a for-hire operation to generate revenue.
Smuggling
Smuggling is the clandestine transportation of illegal goods or persons. It usually involves illegal movement across an international border. There are various motivations to smuggle. These include participation in illegal trade, illegal immigration or emigration, and tax evasion. Smuggling is often related to trafficking in persons, drugs, or arms.
Trafficking
Trafficking is the transportation of goods or persons for the purpose of making a profit. Criminals conduct illegal trafficking. Human trafficking (trafficking in persons) is the second largest criminal activity in the world—followed by drug trafficking and arms trafficking.
Humans
Human trafficking is the recruitment, transportation, transfer, harboring, or receipt of persons (including children) for the purpose of exploitation. It involves the threat or use of force, coercion, abduction, fraud, deception, and/or abuse. Human trafficking may take two forms:
- Sex trafficking in which a person is induced to perform a commercial sex act.
- The recruitment, harboring, transportation, provision, or obtaining of a person for labor or services, for the purpose of subjection to involuntary servitude, debt bondage, or slavery.
Criminals choose to traffic human beings because, unlike other commodities, people can be used repeatedly and because human trafficking requires little in terms of capital investment.
Human trafficking is not the same as people smuggling. A smuggler may facilitate illegal entry into a country for a fee, but on arrival at their destination, the smuggled person is free. The trafficking victim is coerced in some way and is further exploited after arrival, in order to derive profits. Victims do not agree to be trafficked; they are tricked, lured by false promises, or forced into it. Traffickers control their victims by coercive tactics including deception, fraud, intimidation, isolation, physical threats and use of force, debt bondage, or even force-feeding drugs.
Drugs
The illegal drug trade is a black market consisting of production, distribution, packaging, and sale of illegal psychoactive substances. The legality or illegality of the black markets purveying the drug trade is relative to geographic location. The drug-producing countries may be inclined to tolerate the drug traffickers because of bribery or the effect on the country’s economy. Drugs often cross international borders in order to reach the best paying customers. The massive profits inherent to the drug trade serve to extend its reach. The social consequences of drug trade include crime, violence, and social unrest.
Arms
Arms trafficking involves illicit transfers of arms, ammunition, and associated materials. Criminal organizations may be involved in two types of arms trafficking:
- Small-scale transactions by individuals or small firms that deliberately transfer arms to illicit recipients.
- Higher-value or more difficult illicit shipments of arms involving corrupt officials, brokers, or middle men motivated mainly by profit.
Arms trafficking is driven by a variety of clients, which include—
- Embargoed governments.
- Armed groups involved in war, banditry, terrorism, or insurgency.
- Criminals and criminal organizations.
- Citizens who cannot obtain guns legally.
Some arms and ammunition may come from illicit arms manufacturers. However, the source of a large proportion of illicit conventional arms is government disposals of surplus arms or thefts from insecure government stockpiles. Governments themselves may deliberately facilitate covert flows of arms to their proxies or allies, or to embargoed or suspect destinations for profit.
Arms trafficking is widespread in regions of political turmoil. However, it is not limited to such areas. Most arms trafficking occurs at the regional or local level. Among the most common forms are numerous shipments of small numbers of weapons that, over time, result in the accumulation of large numbers of illicit weapons. While individual transactions occur on a small scale and do not draw attention, the sum total of weapons trafficked is large.
Cyber Crime
Cyber crimes are offenses targeting or using information technology. This includes computers, computer networks, and other telecommunication networks such as the Internet (chat rooms, emails, notice boards, and groups) and mobile phones. Such crimes may threaten not only individuals and groups but also a nation’s security and financial health. Cyber crimes can facilitate a variety of other criminal activities, including money laundering, extortion, fraud, racketeering, gambling, smuggling, and trafficking.
Criminals exploit the speed, convenience, and anonymity that modern technologies offer in order to commit a diverse range of criminal activities. The global nature of the Internet allows criminals to commit almost any online illegal activity anywhere in the world. In the past, cyber crime has been committed by individuals or small groups of individuals. However, an emerging trend is for criminal networks and criminally minded technology professionals to work together and pool their resources and expertise.
Cyber crimes include network intrusions, hacking attacks, malicious software, and account takeovers leading to significant data breaches affecting every sector of the world economy. Advances in computer and telecommunications technology and greater access to personal information via the Internet have created a virtual marketplace for transnational cyber criminals to share stolen information and criminal methodologies. The increasing level of collaboration among cyber criminals raises the level of potential harm to individuals, companies, and governments. Members of online forums discuss cyber crime topics of interest. Criminal purveyors buy, sell, and trade—
- Malicious software.
- Hacking services.
- Spamming devices.
- Personal identification information.
- Credit and debit card data.
- Bank account information.
- Brokerage account information.
- Counterfeit identity documents.
- Other forms of contraband.
Cyber crime falls into two broad categories:
- Computer crimes.
- Intellectual property crimes.
Computer Crimes
Computer crime refers to any crime that involves a computer or computer network. The computer or network may be the target, or it may be used in the commission of a crime, the primary target of which is independent of the computer network or device.
Crimes Targeting Computers
Criminals can cause damage to computers in many ways. For example, an unauthorized intruder can send commands that delete files or shut the computer down. Intruders can initiate a denial-of-service attack that floods the victim computer with useless information and prevents legitimate users from accessing it. A virus or worm can use up all of the available communications bandwidth on an agency or corporate network, making it unavailable to employees. When a virus or worm penetrates a computer’s security, it can delete files, crash the computer, install malicious software, or do other things that impair the computer’s integrity.
Extortion threats involving damage to a computer are a high-technology variation of old-fashioned extortion. Intruders may threaten, unless their demands are met, to—
- Penetrate a system and encrypt or delete a database (erasing or corrupting data or programs).
- Distribute denial-of-service attacks that would shut down (or slow down) the victim’s computers.
- Steal confidential data.
The threat need not be sent electronically.
Crimes may involve intercepting or interfering with communications through the use of electronic, mechanical, or other devices. This applies to electronic communications as well as oral and wire communications via common carrier transmissions. This may involve—
- Spyware or intruders using packet sniffers.
- Persons improperly cloning email accounts.
- Other surreptitious collection of communications from a victim’s computer.
The crime may extend to the unauthorized disclosure of the contents of an illegally intercepted communication or using such information for other criminal purposes. Such crimes may also injure or destroy various types of communication operated or controlled by a government or used for a state’s military or paramilitary functions.