Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 12:15 pm
Time: 12:15 pm
Results for dark networks
4 results foundAuthor: McCarthy-Jones, Anthea Title: Mexical Drug Cartels and Dark-Networks: An Emerging Threat to Australia's National Security Summary: Over the past decade Mexican drug cartels' power and the violent struggles between them have increased exponentially. Previously Mexico, and in particular the border regions with the US, were the key battle grounds for control of distribution routes. However, today Mexican drug cartels are now looking abroad in an attempt to extend their operations. This expansion has seen several cartels moving into lucrative international markets in Europe and the Asia Pacific. It is in this context that Australia has now become a target of several Mexican cartels. They have already established linkages in the Asia Pacific and are further attempting to strengthen and expand these - with a particular focus on penetrating the Australian market. These developments show how Mexican drug cartels operate as 'dark-networks', successfully creating a global system that seeks to capture new markets, and further extend their control and dominance of the flow of illicit drugs around the world. For Australia, the emergence of Mexican drug cartels in local markets presents not only criminal but strategic challenges. The size of these operations, their resources and 'dark-network' structure makes them a difficult opponent. Their presence threatens to not only increase the supply of illicit drugs in Australia, but encourage turf wars, increase the amount of guns in the country, tax border security resources and threaten the stability and good governance of South Pacific transit spots. This represents the end of Australia's 'tyranny of distance', which previously acted as a buffer and protected Australia from the interests of remote criminal groups such as the Mexican cartels. Details: Australian National University, Strategic and Defence Studies Centre, 2016. 12p. Source: Internet Resource: Centre of Gravity Series: Accessed May 18, 2016 at: http://ips.cap.anu.edu.au/sites/default/files/COG%20%2325%20Web%20v3.pdf Year: 2016 Country: Australia URL: http://ips.cap.anu.edu.au/sites/default/files/COG%20%2325%20Web%20v3.pdf Shelf Number: 139078 Keywords: Border SecurityDark NetworksDrug CartelsDrug TraffickingIllegal DrugsOrganized Crime |
Author: Jones, Nathan P. Title: The State Reaction: A Theory of Illicit Network Resilience Summary: This dissertation elucidates the relationship between a profit-seeking illicit network's (PSIN's) business strategy and resilience. The dissertation finds that territorial PSIN business strategies challenge "the territorially sovereign state" through activities like kidnapping and extortion. The intensity of the state reaction to the illicit network was the single most important factor in its ability to survive disruptive events. The state, in this case Mexico, reacted more intensely to territorial PSIN's in collaboration with civil society, other states and rival "transactional" PSIN's. In this case the state (Mexico) dissolved a territorial PSIN, suggesting that the state is capable of effectively confronting this illicit network type. On the other hand, the case finds that the state was corrupted by transactional PSINs whose business strategies made them resilient. This finding suggests that through corruption, transactional PSINs will pose a long-term threat to democratic institutionalization in Mexico and internationally anywhere that states must address these illicit networks. The dissertation is an in-depth historical case study of the Tijuana Cartel, also known as the Arellano Felix Organization (AFO). Through archival research and interviews with experts on the illicit network a case study was constructed. Experts interviewed for the dissertation during nine months of fieldwork in Mexico City and Tijuana, included: journalists, law enforcement, scholars, extortion victims and businessmen. Given the similar structures of illicit networks, the findings of this dissertation have important implications for understanding other drug trafficking organizations, prison gangs, terrorists, insurgencies, arms traffickers, among a host of other potential "dark network" actors. Details: Irvine, CA: University of California, Irvine, 2011. 299p. Source: Internet Resource: Dissertation: Accessed May 18, 2016 at: http://wpsa.research.pdx.edu/awards/jones.pdf Year: 2011 Country: Mexico URL: http://wpsa.research.pdx.edu/awards/jones.pdf Shelf Number: 139085 Keywords: Dark NetworksExtortionKidnappingOrganized Crime |
Author: Bensman, Todd Title: The ultra-marathoners of human smuggling: defending forward against dark networks that can transport terrorists across American land borders Summary: National legislation requires America's homeland security agencies to disrupt transnational human smuggling organizations capable of transporting terrorist travelers to all U.S. borders. Federal agencies have responded with programs targeting extreme-distance human smuggling networks that transport higher-risk immigrants known as special interest aliens (SIAs) from some 35 "countries of interest" in the Middle East, North Africa, and Asia where terrorist organizations operate. Yet ineffectiveness and episodic targeting are indicated, in part by continued migration from those countries to the U.S. southwestern border since 9/11. Should an attack linked to SIA smuggling networks occur, homeland security leaders likely will be required to improve counter-SIA interdiction or may choose to do so preemptively. This thesis asks how SIA smuggling networks function as systems and, based on this analysis, if their most vulnerable fail points can be identified for better intervention targeting. Using NVivo qualitative analysis software, the study examined 19 U.S. court prosecutions of SIA smugglers and other data to produce 20 overarching conclusions demonstrating how SIA smuggling functions. From these 20 conclusions, seven leverage points were extracted and identified for likely law enforcement intervention success. Fifteen disruption strategies, tailored to the seven leverage points, are recommended. Details: Monterey, CA: Naval Postgraduate School, 2015. 170p. Source: Internet Resource: Thesis: Accessed June 13, 2016 at: http://calhoun.nps.edu/bitstream/handle/10945/47231/15Sep_Bensman_Todd_Needs_Supplemental.pdf?sequence=5 Year: 2015 Country: United States URL: http://calhoun.nps.edu/bitstream/handle/10945/47231/15Sep_Bensman_Todd_Needs_Supplemental.pdf?sequence=5 Shelf Number: 139403 Keywords: Border Security Dark NetworksHomeland Security Human Smuggling Illegal Immigration Immigrants Immigration Enforcement Terrorists |
Author: Kruisbergen, Edwin W. Title: De digitalisering van georgansieerde criminaliteit Summary: Justitiele verkenningen (Judicial explorations) is published six times a year by the Research and Documentation Centre of the Dutch Ministry of Security and Justice in cooperation with Boom juridisch. Each issue focuses on a central theme related to judicial policy. The section Summaries contains abstracts of the internationally most relevant articles of each issue. The central theme of this issue (no. 5, 2018) is The digitalization of organized crime. The effect of the internet on the structure of organized cybercrime. Findings from an international empirical study Geralda Odinot, Christianne de Poot and Maite Verhoeven Worldwide, the digitalization of society is proceeding rapidly and this brings new forms of crime. The threats arising from different types of cybercrime are real and constantly evolving, as the internet with its anonymity and borderless reach, provides new opportunities for criminal activities. This article describes some results from an international empirical study aimed to gather more insight on the link between cybercrime and organized crime as well as on the question whether cybercrime is organized. It shows how cybercriminals cooperate with each other and what this organization structure looks like. Criminal money flows and IT. On innovative modi operandi, old certainties, and new bottlenecks Edwin Kruisbergen, Rutger Leukfeldt, Edward Kleemans and Robby Roks In this article we analyze how organized crime offenders use IT to handle their money flows. How and to what extent do offenders use IT-facilitated possibilities, such as bitcoin, to launder their money? The empirical data consist of thirty large-scale police investigations. These thirty cases are part of the Organized Crime Monitor, an ongoing research project into the nature of organized crime in the Netherlands. One of the most striking findings is the fact that cash is still king - even for online drug dealers who get paid in digital currencies. Summaries 119 Organized child pornography networks on the Dark Web Madeleine van der Bruggen The emergence of Dark Web child pornography forums and their availability to large offender communities has enabled a professional form of child pornography distribution as well as an increased exchange of criminal and social capital. Offenders have access to a new platform in which strong ties and long-lasting relationships with co-offenders are formed. Moreover they could be classified as organized crime, because child pornography Dark Web forums are characterized by a hierarchical order, a clear role division and illegal power structures that regulate the illegal activities. The implications from a law enforcement as well as from scientific perspective are discussed. The non-human (f)actor in cybercrime. Cybercriminal networks seen from a cyborg crime perspective Wytske van der Wagen and Frank Bernaards Botnets, banking malware and other high-tech crimes are increasingly analyzed by criminological scholars. Their distributed and automated nature poses however various theoretical challenges. This article presents an alternative approach, denoted as the 'cyborg crime' perspective, which adopts a more hybrid view of networks and also assigns an active role to technology. The value of this approach is demonstrated by reflecting on findings from earlier empirical work that analyzes conversations between cybercriminals involved in botnets and related activities. The research shows that technological nodes can take an important position in the organizational structure of cybercriminal networks and do not merely have a functional role. Viewing technology as an actor within a criminal network might offer new criminological insights in both the composition of these networks and how to disrupt them. Out of the shadow. Opportunities for researchers in studying dark markets Thijmen Verburgh, Eefje Smits and Rolf van Wegberg In this article the authors present the lessons learned from previous research efforts into dark markets. First the important features of dark markets are discussed, i.e. anonymity and trust, as well as the question how data on dark markets can be collected. Next, the authors illustrate 120 Justitiele verkenningen, jrg. 44, nr. 5, 2018 how this data can be used to study the phenomenon of dark markets itself as well as the impact of police interventions on dark markets. Befriending a criminal suspect on Facebook. Undercover powers on the Internet Jan-Jaap Oerlemans This article investigates which online undercover investigative methods are applied in practice and how they fit in the Dutch legal framework. In particular, the three special investigative powers of a pseudo purchase, systematic information gathering and infiltration are examined. Investigative powers cannot be applied unilaterally (across state borders). When law enforcement officials cannot reasonably determine the location of the suspect, the online unilateral application of undercover investigative powers is allowed. However, there is still a risk that diplomatic tensions arise with the involved state. States should agree in treaties under which circumstances cross-border online undercover operations are allowed. New investigative powers and the right to privacy. An analysis of the Dutch Cybercrime III Act Bart Custers In 2018 the Dutch parliament accepted new cybercrime legislation (the Cybercrime III Act) that creates several new online criminal offences and gives law enforcement agencies new investigative powers on the Internet. This article describes the background of Dutch cybercrime legislation and the contents of the Cybercrime III Act. The newly introduced cybercrimes are discussed as well as the new investigative competences. Particularly the legitimacy and the necessity of the investigative power of the police to hack computer systems of suspects may significantly interfere with the right to privacy. Details: The Hague: Netherlands Ministry of Justice, 2018. 120p. Source: Internet Resource: Accessed January 24, 2019 at: https://www.researchgate.net/publication/325966795_Georganiseerde_criminaliteit_en_ICT_-_Rapportage_in_het_kader_van_de_vijfde_ronde_van_de_Monitor_Georganiseerde_Criminaliteit/related Year: 2018 Country: Netherlands URL: https://www.researchgate.net/publication/325966795_Georganiseerde_criminaliteit_en_ICT_-_Rapportage_in_het_kader_van_de_vijfde_ronde_van_de_Monitor_Georganiseerde_Criminaliteit/related Shelf Number: 154396 Keywords: Child PornographyCybercrimeDark NetworksInternet CrimesOrganized CrimeUndercover Investigations |