Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views6 pages

CHAPTER TWO Comparative

Chapter Two discusses the globalization of crimes, highlighting transnational crimes such as human trafficking, money laundering, cybercrimes, and environmental crimes that have surged due to increased global trade and communication. It emphasizes the challenges law enforcement faces in combating these crimes, as criminals exploit legal loopholes across borders. The chapter outlines various types of crimes, their causes, and the methods used by criminals to operate internationally.

Uploaded by

echop236
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

CHAPTER TWO Comparative

Chapter Two discusses the globalization of crimes, highlighting transnational crimes such as human trafficking, money laundering, cybercrimes, and environmental crimes that have surged due to increased global trade and communication. It emphasizes the challenges law enforcement faces in combating these crimes, as criminals exploit legal loopholes across borders. The chapter outlines various types of crimes, their causes, and the methods used by criminals to operate internationally.

Uploaded by

echop236
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

CHAPTER TWO:

Globalization of crimes
Learning Objectives:

• identify the different crimes under globalization of crimes and law


enforcement efforts to combat them

Introduction
Crime of globalization, also known as Transnational Crimes, has been
rampant during recent years. As defines, globalization of crimes are crimes
that are committed across national borders. Since the fall of the Soviet Union
and collapse of communism in its neighboring countries, trade has expanded
on a more global level, and with it the crime that so often accompanies large
flows of money. However, even though trade has expanded, the laws and
regulations that govern it often have not. Large corporations from wealthy
countries like the U.S. could suddenly build factories far away, where there
are little to no labor laws, and they could hire children like Jorge and Manuel
to work in their unregulated factories for quite a few dollars less than they
would pay an adult in an American factory. But as we'll see, it gets even
worse than that.

Globalization has increased the opportunities for criminals, and criminals


have been among the major beneficiaries of globalization. The criminals’
international expansion has been made possible by the increasing
movement of people and goods and the increasing ease of communication
that have made it possible to hide the illicit among the expanding licit
movement of people and goods. More significantly, the control of crime is
state-based, whereas nonstate actors such as criminals and terrorists
operate transnationally, exploiting the loopholes within state-based legal
systems to expand their reach.

Crime of globalization are, but not limited to, human trafficking, money
laundering, cybercrimes, piracy, arms smuggling, terrorism, environmental
crimes and the like.

Human Trafficking
Human Trafficking is the commerce and trade in the movement or migration
of people, legal and illegal, including both legitimate labor activities as well
as forced labor.
While, trafficking in Persons is the recruitment, transportation, transfer,
harboring or receipt of persons, by means of: threat or use of force or other
forms of coercion, abduction, fraud, deception, abuse of power, a position of
vulnerability, the giving or receiving of payments or benefits to achieve the
consent of a person having control over another person, for the purpose of
exploitation.

Some causes and facilitators of trafficking in persons are:

a. Lack of employment opportunities

b.Organized crime
c. Regional imbalances
d. Economic disparities
e. Social discrimination
f. Corruption in government
g. Political instability
h. Armed conflicts
i. Mass resettlement without proper resettlement package
j. Profitability
k. Insufficient penalties against traffickers
l. Minimal law enforcement on global sex tourism industry
m. Legal processes that prosecute victims instead of the traffickers n. Poor
international border defense

Money Laundering
Money Laundering is the practice of disguising illegally obtained funds so
that they may seem legal.

Steps of Money Laundering

1. Placement–
(alsocalledimmersion)isthephysicaldisposalofthemoneybymovingfundsf
rom direct association with crime and putting them into the financial
system, usually through Smurfing (moving small amounts at times to
avoid suspicion). It involves bank complicity, the mixing of licit with
illicit funds, cash purchases and the smuggling of currency to safe
havens.
2. Layering – is (also called heavy soaping) the process of disguising the
trail to foil pursuit. It involves the creation of false paper trail,
conversion of cash into monetary instruments and the conversion of
tangible assets obtained by means of cash purchases. Electronic
processes is the most cost-effective layering method. They offer the
criminal speed, distance, minimal audit trail and virtual anonymity
amid the enormous daily volume of electronic transfer, all at minimal
cost.
3. Integration – (also called spin dry) the money is again available to the
criminal with its occupational and geographical origin hidden. Because
the money is often repatriated in the form of clean, often taxable
income. It is achieved by means of real estate transactions, front
companies and sham loans, foreign bank complicity and false import
and export transactions.

Cybercrimes
Cybercrimes are defined as:

 Any offense that is committed by a computer, computer system or


computer network
 Any offense in which the computer, computer system or computer
network is the target
 Any offense in which the computer, computer system or computer
network is used to

hide or store possible evidence

Categories of Cybercrimes

1. Children and adolescents from 6-18 years old – due to their


inquisitiveness to explore things
2. Organized hackers – the reasons are usually political as well as
fundamentalism
3. Professional hackers – their work is motivated by the color of money
4. Discontented employees – employees who are sacked or dissatisfied

Manners of Committing Cybercrimes

1. Hacking – or cracking – the unauthorized access into or interference in


a computer system, server, or information and communication system;
or any access in order to corrupt, alter, steal, or destroy using a
computer or other similar information and communication devices,
without the knowledge and consent of the owner of the computer or
information and communication system; including the introduction of
computer viruses and the like, resulting in the corruption, destruction,
alteration, theft or loss of electronic data messages or electronic
document.
1. Denial of Service Attack – the bandwidth of the victim’s network
is flooded or his e-mail box is filled with spam mail depriving him
of the services he is entitled to access or provide.
2. Virus Dissemination – this is usually done by means of a
malicious code or software that modifies or destroys data, steals
data or allows unauthorized access, or exploits or damages a
system in a manner not intended by the user.
3. Web Defacement – this is the act of the intruder into a server
and changing without permission all the aspect of a website
which the public can see
2. Theft of information contained in Electronic Form – information stored
in the computer hard disc, removable storage media, etc. are stolen
3. E-mail Bombing – large number of e-mails are sent to the victim that
results to crashing
4. Data Diddling – raw data are altered just before the computer
processes them and then

changing it back after the processing is completed

5. Salami Attack – logic bombs are introduced into the bank’s system that
result to the deduction of an insignificant amount from every account
and transferred into a single account
6. Denial of Service Attack – the computer of the victim is flooded with
more request than it could handle which cause it to crash
7. Virus or worm attack – viruses are programs that attach themselves to
a computer or a file and then circulate to other files or to the other
computers on a network. They usually alter or delete data. Worms eat
up the available space on a computer’s memory
8. Logic Bombs – are event-dependent programs created to do something
only when a certain event occurs e.g. viruses that lie dormant and only
become active at particular dates
9. Trojan Attacks – are unauthorized programs which passively gains
control over another’s system by representing itself as an authorized
program.

10.Internet Time Theft – the internet surfing hours of the victim are used up
by another person without his consent

11.Web Jacking – the hacker gains access and control over the web site of
another.
12.Software Piracy – software are stolen through the illegal copying of
genuine programs and the

products distributed to the customers


13.Online Gambling – betting in the hope of winning money through the
internet 14.Pornography – computers are used in the production, distribution,
encryption and storage of
digital images usually of children who are usually the victims of pedophiles.
15.Internet Relay Chat – hackers and even other criminals use chat rooms for
discussing their

exploits and share techniques in committing criminal acts


16.E-mail threats and extortion – the criminal sends threatening emails or
threatens the victim via

the chat rooms. It could also be done by copying the company’s confidential
data or trade

secrets in order to extort huge amount of money from the company


17.Phising – a form of identity theft in which scammers send mass emails
posing as banks, credit

card companies, popular commercial web sites, asking the recipients to


confirm or update

financial information in a hyperlink in order to appear like it came from the


original website 18.Cyber Stalking – the criminal follows the victim by
sending emails, and frequently entering the

chat rooms that causes an intentional, substantial and unreasonable


intrusion into the private

life of the person causing him mental distress


19.Cyber Defamation – the use of the computer system to make false
statements against a

person thereby injuring his reputation


20.E-mail Spoofing – the emails are misrepresented and they usually contain
viruses 21.Computer vandalism – any physical harm done to the computer
set
22.Cyber Terrorism – it is the premeditated use of disruptive activities, or the
threat thereof, in

cyber space, with the intention to further social, ideological, religious,


political or similar

objectives, or to intimidate any person in furtherance of such objectives.


23.Cyber Fraud and Cheating – it is the most lucrative business nowadays
that consist of credit

card crimes, contractual crimes, offering jobs, etc.


24.Harassment via emails – the person threatens or blackmails the victim by
sending him emails 25.Computer Sabotage – is the input, alteration, erasure
or suppression of computer or

communication data, programs, systems or networks. It also includes


computer fraud and forgery.

Both instruments promote international cooperation to tackle the challenges


posed by the illicit trafficking of weapons. The Firearms Protocol pursue this
through promoting cooperation to combat and prevent transnational
organized crime more effectively, while the ATT is more generally refers to
international humanitarian law, the reduction in armaments, as well as
human rights considerations (UNODC, 2016).

Environmental Crimes
Environmental criminals pose a grave threat to our everyday lives, our
planet and to future generations. Borders do not restrict environmental
crimes, which range from ivory trafficking and overfishing of protected
species, to illegal logging and the dumping of hazardous waste.

The same routes used to smuggle wildlife across countries and continents
are often used to traffic weapons, drugs and people. Indeed, environmental
crime often occurs hand in hand with other offences such as passport fraud,
corruption, money laundering and even murder.

Unlike the illegal trade in drugs and other illicit goods, natural resources are
finite and cannot be replenished in a lab. As such, there is a sense of
urgency to combat environmental crime.

You might also like