Illicit data markets have emerged on Telegram, a popular online instant messaging application, bringing together thousands of users worldwide in an unregulated exchange of sensitive data. These markets operate through vendors who offer enormous quantities of such data, from personally identifiable information to financial data, while potential customers bid for these valuable assets. This study describes how Telegram data markets operate and discusses what interventions could be used to disrupt them. Using crime script analysis, we observed 16 Telegram meeting places encompassing public and private channels and groups. We obtained information about how the different meeting places function, what are their inside rules, and what tactics are employed by users to advertise and trade data. Based on the crime script, we suggest four feasible situational crime prevention measures to help disrupt these markets. These include taking down the marketplaces, reporting them, spamming and flooding techniques, and using warning banners. This is a post-peer-review, pre-copyedit version of an article published in Trends in organized crime . The final authenticated version is available online at https://doi.org/10.1007/s12117-024-09532-6
DOCUMENT
This paper investigates the prospective application of arbitration by Transnational Private Regulation (TPR). It builds on the study of TPR developed by Fabrizio Cafaggi et al. TPR addresses the ever-increasing transfer of regulatory power from national to global levels, and from public to private regulators. TPR entails private regulatory co-operation be-yond the jurisdictional boundaries of States through voluntary standards. The regimes of TPR are built by a variety of actors, such as companies, NGOs, independent experts, and epistemic communities. Examples of TPR can be found in food safety, forestry management, trade, and derivatives, among other fields. More specifically, they concern private actors engaging in transnational coordination of standard setting such as the Forest Stewardship Council (FSC) that was developed to foster responsible management of the world’s forests. There are four main characteristics of TPR: legitimacy, quality, effectiveness, and enforcement. I will describe those four characteristics in brief here. First, the legitimacy of TPR is built around consent through voluntary entry, participation, and exit of regulated entities. Important to this contribution is that the legitimacy of TPR goes beyond its legal dimension, measured by purely legal standards. Hence, the legitimacy of TPR is largely determined by standards developed by social and economic institutions relevant to specific TPR regimes. The role of those institutions in standard settings is higher in private TPR regimes than private-public TPR regimes, where some forms of compliance are mandatory. Second, the quality of TPR corresponds to the ex ante and ex post evaluation cycle of regulatory processes. It is also linked with the transparency of TPR. Third, the effectiveness of TPR is measured according to the extent to which the objectives of TPR (or selected TPR regimes) are met. And finally, enforcement of TPRis understood as ‘ensuring compliance with commitments’. Enforcement of TPR can take place through courts, administrative agencies, and private dispute resolution—including the arbitration at the core of this contribution. Cafaggi’s study identified rather selective use of arbitration in TPR, but also recommended changes to make arbitration law more adaptable to TPR. Furthermore, the study recommended that more specialized dispute resolution institutions are created to exclusively serve TPR. Against this background, I shift the main focus of analysis from TPR to arbitration. Whereas Cafaggi argued that arbitration may be suitable for TPR as a means of private enforcement, in this paper I go even further, arguing that arbitration as a means of informal, out-of-court dispute resolution is well suited to strengthen the normativity of TPR. This is so because private arbitration actors (including, inter alia, arbitrators and arbitral institutions) are already equipped with the tools necessary to facilitate cross-border TPR, which is done through informal standards and procedures with origins in the communitarian values and reputational mechanisms used by different communities before the development of modern States. The roots of most private justice regimes—including arbitration—are informed by communitarian values such as collaboration, participation, and personal trust. Those values, together with other core characteristics of arbitration correspond to all core characteristics of TPR, making both systems comparable and complementary. The analytical framework incorporated in this paper follows the four core characteristics of TPR. Hence, the paper is organized into five sections. The first section contains the introduction. In the second section, I analyze the legitimacy of arbitration vis-à-vis the legitimacy of TPR. In the third section, I investigate the accountability of arbitration as a means of quality signaling vis-à-vis TPR. In the fourth section, I focus on the remedies available to arbitrators in a view of TPR’s effectiveness. Finally, in the fifth section, I analyze enforcement through arbitration and its impact on the exclusiveness versus complementarity of TPR regimes. Conclusions follow, including recommendations for future research. Part of topic "The blurring distinction between public and private in international dispute resolution"
MULTIFILE
In our highly digitalized society, cybercrime has become a common crime. However, because research into cybercriminals is in its infancy, our knowledge about cybercriminals is still limited. One of the main considerations is whether cybercriminals have higher intellectual capabilities than traditional criminals or even the general population. Although criminological studies clearly show that traditional criminals have lower intellectual capabilities, little is known about the relationship between cybercrime and intelligence. The current study adds to the literature by exploring the relationship between CITO-test scores and cybercrime in the Netherlands. The CITO final test is a standardized test for primary school students - usually taken at the age of 11 or 12 - and highly correlated with IQ-scores. Data from Statistics Netherlands were used to compare CITO-test scores of 143 apprehended cybercriminals with those of 143 apprehended traditional criminals and 143 non-criminals, matched on age, sex, and country of birth. Ordinary Least Squares regression analyses were used to compare CITO test scores between cybercriminals, traditional criminals, and non-criminals. Additionally, a discordant sibling design was used to control for unmeasured confounding by family factors. Findings reveal that cybercriminals have significantly higher CITO test scores compared to traditional criminals and significantly lower CITO test scores compared to non-criminals.
DOCUMENT
"Probation is a fast-developing field that plays an important role in the response to crime and the prevention of reoffending. Probation covers various sanctions and community-based measures, including supervision and community service, designed to promote community safety and the social inclusion of offenders. This brochure is intended for justice ministers, other politicians and senior civil servants interested in setting up or upgrading a probation service. The ‘key message’ highlights the main topics and messages in this brochure. Readers who want to learn more about the benefits of probation and about how to bring these into practice should read the full text."
DOCUMENT
"Probation is a fast-developing field that plays an important role in the response to crime and the prevention of reoffending. Probation covers various sanctions and community-based measures, including supervision and community service, designed to promote community safety and the social inclusion of offenders. This brochure is intended for justice ministers, other politicians and senior civil servants interested in setting up or upgrading a probation service. The ‘key message’ highlights the main topics and messages in this brochure. Readers who want to learn more about the benefits of probation and about how to bring these into practice should read the full text."
DOCUMENT
In dit artikel worden de mogelijke gevolgen belicht van de introductie van nieuwe en bestaande toepassingen van Bitcoin-technologie. De transnationale, decentrale en gedistribueerde peer-to-peer-structuur van de Bitcoin-technologie en van nieuwe toepassingen hiervan, hebben de potentie om bestaande sociale relaties en instituties te ontregelen. Het krachtenveld waarin maatschappelijke actoren staan kan hierdoor uit balans worden gebracht. De meest radicale van deze nieuwe technologieën is Ethereum. Met name het concept van de Digital Autonomous Organisation (DOA) heeft mogelijkerwijs verregaande consequenties. Ethereum is een ‘contract validating and enforcing system’, een gedistribueerd systeem dat een platform biedt voor autonome computerprogramma’s die in staat zijn om zelfstandig overeenkomsten met rechtspersonen en andere DOA’s aan te gaan en te ontbinden. Ik richt mij op de mogelijkheden van deze toepassingen als nieuwe platformen voor International Financial (Cyber) Crime.
DOCUMENT
Frontline professionals such as social workers and civil servants play a crucial role in countering violent extremism.Because of their direct contac twith society,first liners are tasked with detecting individuals that may threaten national security and the democratic rule of law. Preliminary screening takes place during the pre-crime phase. However, without clear evidence or concrete indicators of unlawful action or physical violence, it is challenging to determine when someone poses a threat. There are no set patterns that can be used to identify cognitive radicalization processes that will result in violent extremism. Furthermore, prevention targets ideas and ideologies with no clear framework for assessing terrorism-risk. This article examines how civil servants responsible for public order, security and safety deal with their mandate to engage in early detection, and discusses the side effects that accompany this practice. Based on openinterviews with fifteen local security professionals in the Netherlands, we focus here on the risk assessments made by these professionals. To understand their performance, we used the following two research questions: First, what criteria do local security professionals use to determine whether or not someone forms a potential risk? Second, how do local security professionals substantiate their assessments of the radicalization processes that will develop into violent extremism? We conclude that such initial risk weightings rely strongly on ‘gut feelings’ or intuition. We conclude that this subjectivitymayleadto prejudiceand/oradministrativearbitrariness in relationtopreliminary risk assessment of particular youth.
DOCUMENT
Digital surveillance technologies using artificial intelligence (AI) tools such as computer vision and facial recognition are becoming cheaper and easier to integrate into governance practices worldwide. Morocco serves as an example of how such technologies are becoming key tools of governance in authoritarian contexts. Based on qualitative fieldwork including semi-structured interviews, observation, and extensive desk reviews, this chapter focusses on the role played by AI-enhanced technology in urban surveillance and the control of migration between the Moroccan–Spanish borders. Two cross-cutting issues emerge: first, while international donors provide funding for urban and border surveillance projects, their role in enforcing transparency mechanisms in their implementation remains limited; second, Morocco’s existing legal framework hinders any kind of public oversight. Video surveillance is treated as the sole prerogative of the security apparatus, and so far public actors have avoided to engage directly with the topic. The lack of institutional oversight and public debate on the matter raise serious concerns on the extent to which the deployment of such technologies affects citizens’ rights. AI-enhanced surveillance is thus an intrinsically transnational challenge in which private interests of economic gain and public interests of national security collide with citizens’ human rights across the Global North/Global South divide.
MULTIFILE
English translation of the first chapter of "Negen plagen tegelijk : hoe overleven we de toekomst?" (vert.: Marije Fresacher)
DOCUMENT
Witwassen wordt beschouwd als een ernstige bedreiging voor de Europese Unie. Sinds juni 2017 dient het anti-witwasbeleid van de lidstaten te zijn gebaseerd op de uitgangspunten en eisen van de vierde Europese anti-witwasrichtlijn. Deze richtlijn beoogt een aantal knelpunten en tekortkomingen van de eerdere Europese regelgeving op te lossen. De misschien wel meest relevante verandering van de nieuwe richtlijn is de verplichte hantering van de risicogerichte benadering van het witwassen op drie niveaus: door de lidstaten, door de verschillende toezichthouders en door de individuele instellingen. De achterliggende gedachte daarvan is dat overheden en instellingen hun beleid en inzet van middelen kunnen aanpassen aan het risicoprofiel, de feitelijke witwasdreiging, per sector, product of klantgroep. In beginsel kan een dergelijke aanpak leiden tot meer resultaat en lagere kosten. In dit artikel wordt ingegaan op de belangrijkste praktische aspecten van de risicogerichte aanpak en de mogelijke impact op zowel de doeltreffendheid, als de doelmatigheid van de Nederlandse witwasbestrijding. De kernvraag die aan de orde komt, is in hoeverre de vierde richtlijn, en de gewijzigde Wet ter voorkoming van witwassen en financieren van terrorisme (Wwft), daadwerkelijk risicogericht anti-witwasbeleid faciliteert. Hoewel de inkt van de nieuwe richtlijn nauwelijks is opgedroogd, wordt er door wetgevende Europese gremia druk gesproken over substantiële aanpassingen van de Vierde Richtlijn. Omdat de definitieve tekst van deze Vijfde Richtlijn nog niet bekend is, wordt in dit artikel niet verder ingegaan op de mogelijke aanpassingen. LinkedIn: https://www.linkedin.com/in/pietersteenwijk/
DOCUMENT