| |
| |
Preface | |
| |
| |
About the Author | |
| |
| |
| |
The Universe of Transnational Crime | |
| |
| |
Types of Transnational Crime | |
| |
| |
The Ethnicity Trap and Transnational Crime | |
| |
| |
Criminal Networks Versus Formal Organizations | |
| |
| |
| |
Drug Trafficking | |
| |
| |
The Nature of Transnational Drug Trafficking | |
| |
| |
The Volume of Drug Trafficking | |
| |
| |
Assessing Drug Trafficking Trends | |
| |
| |
Focusing on Drug Markets Versus Drugs and Drug Traffickers | |
| |
| |
The Legalization Argument and Drug Trafficking | |
| |
| |
Drug Use and the Ultimate Solution | |
| |
| |
| |
Stolen Property | |
| |
| |
Typology of Stolen Property Crimes | |
| |
| |
Trafficking in Stolen Consumer Goods | |
| |
| |
Weapons Trafficking | |
| |
| |
Antiquities and Art | |
| |
| |
Natural Resources | |
| |
| |
The Essential Enabler for Stolen Property Trafficking | |
| |
| |
| |
Counterfeiting | |
| |
| |
The Nature of Counterfeiting and Forgery | |
| |
| |
The Extent of Counterfeiting and Forgery | |
| |
| |
The Harms of Counterfeiting | |
| |
| |
Counterfeiting Enforcement | |
| |
| |
Counterfeiting Prevention | |
| |
| |
| |
Human Trafficking | |
| |
| |
What Is Human Trafficking? | |
| |
| |
Extrapolating Risk | |
| |
| |
A Criminal Enterprise Approach | |
| |
| |
Recruiters, Transporters, and Exploiters | |
| |
| |
Combining Victim Risk Assessments with Criminal Enterprises | |
| |
| |
The Future of Human Trafficking | |
| |
| |
| |
Fraud and Cybercrime | |
| |
| |
Changes in Property Ownership and Storage | |
| |
| |
The Movement of Property | |
| |
| |
The Extent of Fraud | |
| |
| |
Protecting Property from Larceny | |
| |
| |
Crime Prevention Technology Reacts to Criminal Technology | |
| |
| |
The Causes and Prevention of Theft and Fraud | |
| |
| |
| |
Commercial Vices: Obscenity and Pornography | |
| |
| |
Defining Obscenity and Pornography | |
| |
| |
How Much Obscenity Is There? | |
| |
| |
The Pornography-Harm Link | |
| |
| |
The Rise of the Internet | |
| |
| |
New Approaches to an Old Problem | |
| |
| |
Obscenity: From Sex to Violence | |
| |
| |
Why Is Pornography So Popular? | |
| |
| |
| |
Extortion and Racketeering | |
| |
| |
Infiltration of Business | |
| |
| |
The Nature of Extortion | |
| |
| |
Protection Rackets | |
| |
| |
What Is a Racketeer? | |
| |
| |
Hidden Ownership and Ancillary Enterprises | |
| |
| |
The Secretive Nature of Criminal Enterprises | |
| |
| |
| |
Money Laundering | |
| |
| |
The Dimensions of Money Laundering | |
| |
| |
Problems of Anti-Money-Laundering Compliance | |
| |
| |
Asset Forfeiture | |
| |
| |
The Boundaries of Asset Seizure | |
| |
| |
Pressures Countering Anti-Money-Laundering Efforts | |
| |
| |
| |
Corruption and the Future | |
| |
| |
What Is Corruption? | |
| |
| |
Costs of Corruption | |
| |
| |
How Does Corruption Flourish? | |
| |
| |
How Much Corruption Is There? | |
| |
| |
Enforcing Anti-Corruption Measures | |
| |
| |
The Future: Can Corruption Be Reduced or Eliminated? | |
| |
| |
Glossary | |
| |
| |
Index | |