Professional Documents
Culture Documents
Chapter Iv. Transnational Organized Crime
Chapter Iv. Transnational Organized Crime
Chapter Iv. Transnational Organized Crime
CHAPTER IV.
TRANSNATIONAL ORGANIZED CRIME
1
MODULE: COMPARATIVE MODELS IN POLICING
Underground criminal societies based in Hong Kong. They control secret
markets and bus routes and are often involved in money laundering and drug
trafficking.
Heijin
Taiwanese gangsters who are often executives in large corporations. They are
often involved in white collar crimes, such as illegal stock trading and bribery,
and sometimes run for public office.
Jao Pho.
Organized crime group in Thailand. They are often involved in illegal political
and business activity.
Red Wa.
Gangsters from Thailand. They are involved in manufacturing and trafficking
methamphetamine.
2
MODULE: COMPARATIVE MODELS IN POLICING
Drug Trafficking
Drug trafficking involves selling drugs and drug paraphernalia, whether is it
local exchange between a user and a dealer or a major international operation.
Drug trafficking A problem that affects every nation in the world and exists in
many levels. Drug trafficking is the commercial exchange of drugs and drug
paraphernalia. This include any equipment used to manufacture illegal drugs
or use them.
Cybercrimes
Cybercrimes are generally defined as any type of illegal activity that makes
use of the Internet, a private or public network, or an in-house computer
system. While many forms of cybercrime revolve around the appropriation of
proprietary information for unauthorized use, other examples are focused more
on a invasion of privacy. As a growing problem around the world, many
countries are beginning to implement laws and other regulatory mechanisms in
an attempt to minimize the incidence of cybercrime.
Cybercrimes - are generally defined as any type of illegal activity that makes
use of the Internet, a private or public network, or an in-house computer
system.
Cyberstalking - a technologically based attack on person because of anger,
revenge, or control.
Computer Fraud - altering data or gaining unlawful use of computer or
services.
Identity Theft - using another's personal information to commit fraud or other
crimes.
Computer Viruses - a program that copies itself and infects a computer.
3
MODULE: COMPARATIVE MODELS IN POLICING
Cybercrimes
1. The use of violence and threats to intimidate or coerce, especially for
political
purposes.
2. The state of fear and submission produced by terrorism for terrorization.
3. A terroristic method of governing or of resisting a government.
Terrorism is the systematic use of terror especially as a means of coercion. At
present, the International community has been unable to formulate a university
agreed, legally binding, criminal law definition of terrorism. Common definitions
of terrorism refer only to those violent acts which are intended to create fear
(terror), are perpetrated for a religious, political, or ideological goal, and
deliberately target or disregard the safety of non-combatants (civilians). Some
definitions also include acts of unlawful violence and war. This history of
terrorism organizations suggest that they do not select terrorism for its political
effectiveness. Individual terrorists tend to be motivated more by a desire for
social solidarity with other members of their organization than by political
platforms or strategic objectives, which are often murky and undefined.
4
MODULE: COMPARATIVE MODELS IN POLICING
Money Laundering
Money Laundering is the process of creating the appearance that large
amounts of money obtained from serious crimes, such as drug trafficking,
originated from a legitimate source. It is a crime in many jurisdictions with
varying definitions. It is a key operation of the underground economy.