Srl | Item |
1 |
ID:
188017
|
|
|
Summary/Abstract |
This article analyzes extortion by terrorist groups. A three-factor theoretical framework borrowed from the literature on organized crime informs the qualitative analysis of several terrorist organizations—active and quiescent—which have committed casual and systematic extortion of businesses and local communities in exchange for protection. It is argued that similarly to organized crime, extortion is a common means of terrorism financing. Terrorist groups, especially those aspiring for statehood, rely on extortion of local communities and businesses under the disguise of “taxation.” Partly by coercion and partly by manipulation, governance-capable terrorist organizations, like the Islamic State in Iraq and the Levant (ISIL)/Da’esh, have demonstrated unprecedented ability to reshape the victim-offender relationship in the way that transforms victims of extortion into involuntary terrorist supporters. Viewing terrorist activity through the governance perspective sheds new light on the evolution of extortion and its place in terrorism studies.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
112630
|
|
|
Publication |
2012.
|
Summary/Abstract |
According to IMF and OSCE reports, informal economic transactions in Russia and other states of the former Communist Bloc have cushioned the shocks of economic and political transition of the 1990s by quickly satisfying the consumer demand and providing unofficial jobs to the population faced with transition recession. As these analyses extensively emphasise the advantages of informal entrepreneurship and its positive contribution to stimulating economic growth, this article explores the phenomenon of shuttle trade - a system/form of informal trade outside state control that does not comply with state regulations - as an issue of concern for criminologists. This article investigates the convergence of shuttle trade and criminal activities and the relationship of shuttle trade to the formal regulatory environment. It offers insights into selected criminal activities at Cherkizovsky market in Moscow before its shutdown in 2009 and an evaluation of the policymaking decisions the shutdown triggered.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
109845
|
|
|
4 |
ID:
142068
|
|
|
Summary/Abstract |
Attacks on oil and gas infrastructures by terrorists and criminals in places like Nigeria, Colombia, Iraq and Russia have amplified the vulnerability of critical energy infrastructures (CEIs) to deliberate physical attacks. Being unable or unwilling to protect CEIs, many national governments have made attempts to alleviate these vulnerabilities through outsourcing of security, i.e. contracting the responsibility to protect CEIs out to non-state actors. This article advocates the need to conceptualize security outsourcing in the domain of critical energy infrastructure protection (CEIP) in order to explain a variety of regulatory choices made by governments in this domain. Based on a qualitative analysis of four case studies, the article discusses various types of security outsourcing in the protection of CEIs, including the militarization of national oil companies, public–private partnerships and the involvement of international organizations and local social groups. The typology may serve as a tool of describing, classifying and evaluating various forms of security outsourcing. The findings of the article help to deconstruct the complexity of security outsourcing and capture some of the major contemporary trends in energy security.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
129091
|
|
|