Pitchgrade

Presentations made painless

  • Get Premium

106 Organized Crime Essay Topic Ideas & Examples

Inside This Article

Organized crime is a pervasive and complex phenomenon that has plagued societies for centuries. From the Italian Mafia to Mexican drug cartels, organized crime groups have managed to infiltrate all levels of society, from politics to business.

If you are studying criminology or criminal justice, you may be tasked with writing an essay on organized crime. To help you get started, we have compiled a list of 106 organized crime essay topic ideas and examples:

  • The history and origins of organized crime
  • The impact of organized crime on society
  • The role of organized crime in human trafficking
  • The relationship between organized crime and terrorism
  • The evolution of organized crime in the digital age
  • The influence of organized crime on politics
  • The strategies used by law enforcement to combat organized crime
  • The impact of organized crime on economic development
  • The gender dynamics of organized crime
  • The role of organized crime in the drug trade
  • The connection between organized crime and corruption
  • The role of the Italian Mafia in organized crime
  • The impact of organized crime on urban communities
  • The tactics used by organized crime groups to evade law enforcement
  • The relationship between organized crime and cybercrime
  • The impact of organized crime on global security
  • The role of organized crime in the illegal arms trade
  • The connection between organized crime and money laundering
  • The role of organized crime in the smuggling of contraband goods
  • The impact of organized crime on the environment
  • The effectiveness of international cooperation in combating organized crime
  • The role of organized crime in the trafficking of counterfeit goods
  • The impact of organized crime on human rights
  • The connection between organized crime and organized labor
  • The role of organized crime in the illegal gambling industry
  • The strategies used by organized crime groups to recruit new members
  • The impact of organized crime on the healthcare industry
  • The relationship between organized crime and piracy
  • The role of organized crime in the illegal wildlife trade
  • The connection between organized crime and the arms trade
  • The impact of organized crime on the music industry
  • The role of organized crime in the trafficking of cultural artifacts
  • The tactics used by organized crime groups to intimidate and control communities
  • The impact of organized crime on the education system
  • The relationship between organized crime and the illegal drug trade
  • The role of organized crime in the trafficking of women and children
  • The connection between organized crime and political corruption
  • The impact of organized crime on the transportation industry
  • The strategies used by law enforcement to dismantle organized crime networks
  • The impact of organized crime on the construction industry
  • The relationship between organized crime and the trafficking of organs
  • The connection between organized crime and the smuggling of migrants
  • The impact of organized crime on the fashion industry
  • The strategies used by law enforcement to disrupt organized crime activities
  • The role of organized crime in the counterfeit pharmaceutical industry
  • The relationship between organized crime and the illegal tobacco trade
  • The impact of organized crime on the food industry
  • The connection between organized crime and the trafficking of drugs
  • The role of organized crime in the illegal mining industry
  • The impact of organized crime on the telecommunications industry
  • The strategies used by law enforcement to combat organized crime in the digital age
  • The role of organized crime in the illegal fishing industry
  • The relationship between organized crime and the illegal logging trade
  • The impact of organized crime on the energy industry
  • The connection between organized crime and the trafficking of arms
  • The role of organized crime in the illegal waste disposal industry
  • The impact of organized crime on the pharmaceutical industry
  • The strategies used by law enforcement to combat organized crime in the healthcare sector
  • The relationship between organized crime and the illegal wildlife trade
  • The impact of organized crime on the pornography industry
  • The connection between organized crime and the trafficking of human organs
  • The role of organized crime in the illegal antiquities trade
  • The strategies used by law enforcement to combat organized crime in the music industry
  • The impact of organized crime on the trafficking of women and children
  • The relationship between organized crime and the trafficking of cultural artifacts
  • The role of organized crime in the fashion industry
  • The strategies used by law enforcement to combat organized crime in the food industry
  • The relationship between organized crime and the illegal mining industry

These are just a few ideas to get you started on your organized crime essay. Remember to choose a topic that interests you and conduct thorough research to support your arguments. Good luck!

Want to create a presentation now?

Instantly Create A Deck

Let PitchGrade do this for me

Hassle Free

We will create your text and designs for you. Sit back and relax while we do the work.

Explore More Content

  • Privacy Policy
  • Terms of Service

© 2023 Pitchgrade

Organized Crime - Essay Samples And Topic Ideas For Free

Organized crime refers to highly structured criminal groups who engage in illegal activities for financial gain. Essays could delve into the historical evolution of organized crime, its societal impact, the legal and political challenges of combating organized crime, or case studies of notorious criminal organizations. We’ve gathered an extensive assortment of free essay samples on the topic of Organized Crime you can find at Papersowl. You can use our samples for inspiration to write your own essay, research paper, or just to explore a new topic for yourself.

Crime and the why

Introduction Crime is an unlawful activity conducted by a person who is punishable by the government. The state has the duty to restrict one's free will of committing a crime through the security police officers who have the power to arrest. Whenever a person is found guilty, they are provided separated from the community through imprisonment in order to rectify their behaviors. In both developing and developed countries, crime is very common which result from various reasons such as high […]

Fighting against Gang Violence

A gang is known as a group of individuals with define leadership and internal organizations that identify or claim control over territory. Also known as an organized group of criminals, gangs engage in illegal and in some occasions violent behavior. Gangs vary from prison gangs, motorcycle clubs, ethnic and organized crime gangs to local and national street gangs. In the academic journal History of Street Gangs in the United States they state that "Three main immigrant groups entered the Northeast […]

Violence in Prisons Related to Gangs

One of the key guarantee threats in American correctional facilities is gang related violence. Prison facilities are brought up with emerging difficulties connected to gang related violence for examples such as drugs, murder, extortion, gambling, abuse of religious freedom by plastering hate in the title of religion, “racial enmity” and “racial extremism which is the highest factor of this problem of racial conflict in the facilities. Some of the guarantee threat groups/gangs providing to the horrific matters are: The Aryan […]

We will write an essay sample crafted to your needs.

Modern Slavery – Prostitution, Labor, and Debt Bondage

Human trafficking is a form of modern slavery that serves involuntary solitude, forced prostitution, labor, and debt bondage that happens in the shadows of Charlotte, NC. Involuntary solitude takes away the personal freedom that you have a right as a person. Out of all crimes, Human Trafficking is the fastest growing business of organized crime which can include transnational, national, or local groupings of highly centralized enterprises. It happens through fraud; initiating false promises and/or working conditions, being forced; any […]

Omar Portee: from Gang Origins to Reflections on Society

Omar Portee, commonly known as O.G. Mack, is a name that resonates significantly in discussions about street gang culture in the United States, specifically in relation to the Bloods. A closer look into Portee's life and his affiliations offers insights not only into the inner workings of gangs but also the societal conditions that often lead to their formation and persistence. Born in the Bronx, New York, Omar Portee's early life was fraught with challenges and the tribulations commonly associated […]

Nicky Barnes: from Harlem Kingpin to Federal Informant

The tapestry of American organized crime is peppered with colorful figures, notorious mobsters, and street-wise leaders who often become legends in their own right. Among these, Nicky Barnes stands out, not just for the empire he built but for the dramatic transformation he underwent, from being one of Harlem's most feared drug lords to a government informant. Born Leroy Nicholas Barnes in 1933, Barnes grew up in the Harlem neighborhood of Manhattan. The gritty streets of this area, particularly in […]

June 7th : President

There exists an idea that men and women come from different worlds. The common adage “men are from Mars, women are from Venus” within American culture speaks directly to this notion. Among academic circles, this idea is known as the separate sphere ideology. The separate sphere ideology describes the notion that men belong on the public domain- working, engaging in politics and education, while women belong to a domestic domain- housekeeping and childcare. These ideas were prevalent for hundreds, if […]

The Criminal Escapades of Bonnie and Clyde: a Notorious Duo

Bonnie Parker and Clyde Barrow stand as enduring enigmas in the annals of American criminology, their appellations forever enshrined in the folklore of the Depression era. The saga of Bonnie and Clyde epitomizes a narrative steeped in crime, ardor, and the relentless pursuit by law enforcement, captivating the collective consciousness of the populace and media alike. From 1932 to their dramatic demise in 1934, their criminal odyssey left an indelible imprint that continues to captivate and perplex. The criminal escapades […]

The Birth of a Notorious Legend: when Al Capone Entered the World

Alphonse Gabriel Capone, more widely recognized as Al Capone, entered the world on January 17, 1899, in Brooklyn, New York. This particular date initiated the commencement of the existence of one of America's most notorious mobsters, whose illicit endeavors during the era of Prohibition would etch an enduring imprint on the annals of organized crime in the United States. Delving into the formative years of Capone furnishes a captivating insight into the elements that molded his ascension to power and […]

The Birthplace of Al Capone: Brooklyn’s Infamous Legacy

Al Capone, an infamous figure in American history, emerged from the depths of Brooklyn, New York, on January 17, 1899. His origins and formative years in Brooklyn wielded substantial influence in charting his path toward notoriety. Capone's early milieu and the socio-economic landscape of Brooklyn during his upbringing contributed significantly to his evolution into one of America's most notorious personalities. Born amidst the grit and dynamism of Williamsburg, Brooklyn, to immigrant parents Gabriele and Teresa Capone, young Al navigated a […]

RICO Cases and their Impact on Organized Crime

The Racketeer Influenced and Corrupt Organizations Act (RICO), enacted in 1970, emerged as a formidable weapon against the scourge of organized crime within the United States. It furnishes the legal framework for prosecuting individuals ensnared in ongoing criminal enterprises. Over the passage of time, a plethora of high-profile RICO cases have captured public attention, each serving as a testament to the law's potency and adaptability. This composition endeavors to scrutinize select notable RICO cases and their ramifications for law enforcement […]

Al Capone: the Infamous Gangster and his Criminal Enterprise

Renowned as "Scarface," Al Capone stands as a pivotal figure in the annals of American criminality. His appellation is indissolubly linked with the era of Prohibition, an epoch marred by the federal proscription of alcohol's production, sale, and transit. Born in Brooklyn, New York, in 1899 to Italian immigrant progenitors, Capone forged a notorious criminal hegemony that indelibly marked an era, culminating in his apprehension and subsequent confinement. Capone's foray into delinquency commenced at an early age, initially serving as […]

The Rise and Evolution of the 38th Street Gang: Chronicles of Organized Crime

The association known as the 38th Street Gang, deeply entrenched in the alleys of Los Angeles, carries a narrative as intricate and multifaceted as the city itself. While contemporary headlines often spotlight the gang's involvement in illicit activities, the origins and evolution of the 38th Street Gang weave a tale intricately intertwined with the socio-political fabric of Southern California. This discourse endeavors to illuminate the genesis, growth, and pivotal junctures that have molded the character and conduct of this infamous […]

Shadows of Deceit: the Dark World of Organized Crime

In the hidden recesses of civilization lurks a labyrinth of clandestine machinations, where whispers of collusion and the clinking of tainted wealth echo through the murky corridors of power. Welcome to the realm of organized crime, a dark symphony conducted by shadowy figures whose ambitions know no bounds. Here, morality is a fleeting concept, and loyalty is bought with blood and gold. Organized crime is a multifaceted beast, its tendrils stretching across continents, weaving a complex tapestry of deceit and […]

Getting to Grips with Organized Crime: what it is and why it Matters

Organized crime seems like it's straight out of a movie, with shadowy figures engaging in all sorts of nefarious deeds, from smuggling to extortion. But it's not just something that makes for a gripping watch on a Friday night—it's a real-world issue that has far-reaching implications for all of us. So, what exactly are we talking about when we mention organized crime? Imagine a group that's as well-organized as any large corporation, but instead of selling smartphones or insurance, they're […]

Organized Crime and Symbolism: Unraveling the Latin Kings Gang Sign

The Latin Kings, one of the largest and most organized street gangs in the United States, have a rich history intertwined with unique cultural symbols, particularly their gang sign. This essay delves into the evolution, meaning, and impact of the Latin Kings gang sign, offering insights into how this symbol has become an integral part of the gang's identity and communication. Originating in Chicago in the 1940s, the Latin Kings started as a social group defending the rights and identity […]

Additional Example Essays

  • Does the Death Penalty Effectively Deter Crime?
  • Ted Bundy Research Paper
  • War On Drugs and Mass Incarceration
  • Event that sparked Personal Growth
  • In the Shadow of a Serial Killer: The Life Journey of Aileen Wuornos' Daughter
  • The Road not Taken Poem Analysis
  • The Importance of Professional Bearing in the Military
  • Reasons Why I Want to Study Abroad
  • Homeschooling vs Public School
  • "Mother to Son" by Langston Hughes
  • Socioautobiography Choices and Experiences Growing up
  • Revisiting the Cultural Impact of "Bonnie and Clyde" (1967)

1. Tell Us Your Requirements

2. Pick your perfect writer

3. Get Your Paper and Pay

Hi! I'm Amy, your personal assistant!

Don't know where to start? Give me your paper requirements and I connect you to an academic expert.

short deadlines

100% Plagiarism-Free

Certified writers

  • Tools and Resources
  • Customer Services
  • Conflict Studies
  • Development
  • Environment
  • Foreign Policy
  • Human Rights
  • International Law
  • Organization
  • International Relations Theory
  • Political Communication
  • Political Economy
  • Political Geography
  • Political Sociology
  • Politics and Sexuality and Gender
  • Qualitative Political Methodology
  • Quantitative Political Methodology
  • Security Studies
  • Share This Facebook LinkedIn Twitter

Article contents

Transnational organized crime and terrorism.

  • Katharine Petrich Katharine Petrich Rockefeller College of Public Affairs and Policy, University at Albany, SUNY
  • https://doi.org/10.1093/acrefore/9780190846626.013.705
  • Published online: 19 October 2022

A significant, policy-relevant relationship exists between terrorist groups and transnational organized crime. However, definitional challenges, disciplinary boundaries, and legal logistics all contribute to the mischaracterization of the relationship, leading to piecemeal responses and uneven academic attention. International studies research tends to focus on one or the other, with an emphasis on terrorist group dynamics and choices. Two enduring rationales for separating the study of terrorism from that of transnational organized crime exist: the “greed versus grievance” debate, which argues that organizations pursue either private (financial) goals or public (social or organizational change) goals and the “methods not motives” argument, which suggests groups may overlap in their tactics but diverge in their strategic goals. Terrorist violence by criminal groups is largely held separate from the “transnational crime and terrorism” literature, often categorized instead as “criminal governance” rather than terrorism studies. The reality is much more nuanced: both group types pursue a variety of objectives and engage with a spectrum of actors which may or may not share their aspirations. Members are diverse in their priorities, a fact that is often lost when analysis collapses the rank and file with leadership into a monolithic bloc. Additionally, globalization has increased opportunities for groups to pursue different activities in different theaters. In areas where terrorist groups are contesting for political control and seeking to present themselves as viable alternative governance actors, they may be less likely to work openly with illicit actors, but in areas (or countries) where they have little governance ambition, criminal networks may be important public partners.

These groups intersect in a spectrum of ways, from engaging in temporary ad hoc relationships designed to achieve a specific goal, to fully incorporating the opposite type’s motive into organizational priorities. Political ambitions largely center on power and control, but illicit activities are wide ranging, with the most prominent involving firearms, drugs, and people. Further, there are several important enabling factors that foster these relationships, including corruption, illicit financial flows, fragile states, and lootable resources. When these enabling factors are present, diversification and relationship building are more likely, increasing organizational resilience and making demobilization less likely. These factors, particularly corruption, also increase the chances of organized crime entering the political system.

Looking ahead, both policymakers and academics should consider transnational organized crime and terrorism more holistically. Work that engages with only one element will fall short in assessing the dynamics of irregular conflict, leading to incomplete analysis and weak policy recommendations. Observers should cultivate the flexibility to think in terms of networks and variety across geographic contexts—the way that a terrorist group behaves in one area or with one type of criminal group does not necessarily predict its behavior globally.

  • transnational organized crime
  • irregular conflict
  • illicit economies
  • trafficking
  • black market
  • law enforcement

Introduction

Globalization has brought many benefits for the world in the 21st century : global interdependence means a richer, more peaceful world where people, goods, and ideas move quickly and easily beyond their places of origin. But alongside the benefits, disruptive actors have also capitalized on the shift. Products of “deviant globalization,” these challengers include transnational organized crime groups and terrorist organizations. Powerful on their own, together their impact could be devastating, especially for developing states. Thus, a key question for policymakers is whether the “crime-terror nexus” is an overblown fear or a legitimate relationship. From there, other important questions follow. If it does occur, what are the contours of the interaction? Do criminal terrorists represent a greater or lesser threat than their politically oriented counterparts? Are organized crime groups poised to topple governments? Where is it most likely to occur? How best can governments, organizations, and individuals respond to it?

The history of transnational crime and terrorism relationships can largely be split into before and after the September 11 attacks. Before 2001 , transnational criminal groups and terrorist organizations interacted in a largely transactional manner ( Schmid, 2018 ). For example, terrorist groups might seek out “specialist” organized criminals for help securing counterfeit passports or smuggling members across borders, and transnational organized crime groups might negotiate with terrorists for the right to operate within their sphere of influence ( Shelley & Picarelli, 2002 ). Some groups did rely on crime to support their operational efforts, like extortion and “tiger kidnapping” campaigns run by the Provisional Irish Republican Army and the Ulster Defense Forces during the 1990s ( Silke, 1998 ). During the 1980s and 1990s, these sorts of piecemeal interactions flourished due to increasing economic interdependence outstripping international regulation; further, nonstate actors did not warrant the same type of attention as states did in the international rebalancing after the Cold War. Terrorist group excursions into criminality during this period were generally focused on domestic populations closely situated to the group—this was the era of the petty and domestic offense, not sophisticated international networks. In the post-9/11 security environment, terrorism remains one of the most significant security concerns among policymakers. Such groups’ convergence with or diversification into sophisticated criminal activity represents a major force multiplier, augmenting their ability to disrupt and undermine legitimate governance, resist demobilization, and continue to carry out attacks against civilian populations. In reaction to the upswing in attention, some authors have argued that the relationship is overhyped and represents a much smaller set of interactions than what is portrayed in the discourse. Nexus naysayers argue that the two group types can be differentiated by a bright line due to their dramatically different goals: for terrorist groups, having a politically violent operational goal means that the need to spend money actually outweighs the imperative to earn money ( Aliu et al., 2017 ).

After the attacks on the World Trade Center in 2001 , the United States dramatically increased scrutiny of terrorist financial networks—a move that was followed by other states as attacks struck India ( 2002 ), Russia ( 2004 ), Spain ( 2004 ), and the United Kingdom ( 2005 ). Such attention, in the form of sanctions, asset seizure, account freezes, international arrest and apprehension, and military operations targeting group leadership led terrorist groups to diversify their sources of funding as well as their operational capabilities and recruiting pools. No longer could groups consistently rely on financial support from sympathetic state actors or wealthy individuals, as al-Qaeda and Hezbollah did during the 1990s.

Cut off from “angel investors” after 2001 , terrorist groups have become significantly more likely to rely on illicit or “grey market” financing schemes to support their work. At a minimum, counterterrorism financing measures require terrorist groups to become at least partially competent money launderers because these laws criminalized the movement of money to terrorist groups. Following the money also became a critical component in counterterrorism operations, making groups that did not or were unable to launder funds well particularly vulnerable to disruption.

Interactions between transnational organized crime and terrorism are deeply nuanced and context specific and can be broadly separated into four nodes: ad hoc, continuing, diversified, and converging relationships. Understanding the enabling and demand factors that provide oxygen to terrorist criminal opportunities is key to both understanding the interwoven dynamics as well as developing effective policy responses. Particular attention should be paid to the role of corruption, illicit flows, and lootable resources.

Researching transnational organized crime and terrorism is challenging. Both actor types are incentivized to hide their activities, scope of influence, organizational relationships, and financial assets. Because of this active concealment, quantitative scholars generally rely on government and law enforcement reporting or externally observable actions like attacks. Criminal activity is often overlooked in these studies because it serves logistical or financial purposes for a terrorist group, as opposed to directly contributing to kinetic attacks. Relying on official figures is not without its challenges: what gets counted and how is an inherently political act ( Andreas & Greenhill, 2010 ). States have their own incentives to misrepresent levels of both violence and criminality, and the same accessibility issues that hinder independent researchers can hinder official sources as well. Qualitative scholars struggle with issues of access, data triangulation, and generalizability, resulting in an oversaturation of particular cases and sources. Existing scholarship focuses primarily on developing states, particularly those with weak institutions, preexisting criminal economies, and high levels of corruption ( Shelley, 2014 ). In truth, however, transnational organized crime touches every corner of the world, including the WEIRD countries ( Henrich et al., 2010 ). 1 In fact, many of the most problematic and durable linkages are situated in the Global North ( Makarenko & Mesquita, 2014 ).

What Is Terrorism?

Terrorism has a long history, appearing in nearly every asymmetric conflict. One of the earliest accounts of terrorism centers on nonstate actor resistance to the Roman Empire in the Judea Province in the 1st century ce ( Chaliand & Blin, 2016 ). Groups of all religions, national origins, political aims, and ideological creeds have used violence or the threat of violence against civilian targets to seek political or social change. In the 21st century , there is an unfortunate tendency to associate terrorism with fundamentalist Islamist groups and to assume al-Qaeda “invented” terrorism in September 2001 ( Laqueur, 2001 ). In reality, in 2019 , 265 distinct terrorist groups were active across six continents and carried out attacks in more than 70 countries ( National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2019 ).

Terrorism is a tactic, commonly understood to mean the use of violence (or threat of violence) by a nonstate actor against a civilian or other nonlegitimate target, with the intent of achieving a political, social, economic, or ideological goal ( Ganor, 2002 ; National Consortium for the Study of Terrorism and Responses to Terrorism (START), 2019 ; Saul, 2019 ). Generally, the true targets of terrorism extend beyond the immediate victims of violence to include the broader community. The purpose of terrorist attacks is to generate fear due to indiscriminate violence. Because terrorism is a tactic and may be used as part of a suite of activities, deciding exactly who is a terrorist is a fraught political endeavor. For nonspecialists and the media, terrorist groups can be difficult to differentiate from rebel, insurgent, criminal, or guerrilla groups, despite variations in their technical definitions.

Why Is Terrorism Problematic?

Terrorism generates far more consternation among policymakers and fear among the public than other forms of violence, particularly in WEIRD countries. This is true for terrorist attacks of all types and ideologies and has spurred major counterterrorism initiatives both domestically and internationally. Most terrorist attacks and associated deaths occur in areas experiencing high levels of violence in general, up to the level of civil war; geographically, this maps onto the Middle East and Africa ( Ritchie et al., 2019 ). By the numbers, crime kills and harms far more individuals than terrorist groups do, in all areas of the world. Indeed, in the United States, driving a car or taking a bath are more likely to kill you than a terrorist attack ( Mueller & Stewart, 2018 ). However, despite the large divergence between perceived and actual danger, terrorism occupies far more media and policymaker attention than statistically more risky activities.

This gap between real danger and perceived threat is one of the reasons terrorism is so problematic: the effects of an attack are exponentially greater than the direct harm caused by the violence. Terrorism creates trauma and uncertainty among observers, due in part to the apparently random nature of victims, attack patterns, or attack locations ( Mueller & Stewart, 2018 ). In response, individuals are less likely to invest in long term, durable activities, businesses, or communities. Further, terrorism erodes the social contract enacted between the citizen and state, undermining confidence in governance institutions with negative follow-on effects, particularly in democracies. To prevent and respond to terrorist attacks, governments often turn to draconian counterterrorism measures, creating cures that are worse than the disease. At best, they may resort to “security theater”—measures that may make citizens feel safer but have little functional purpose ( Schneier, 2008 ). Both types of response do little to reduce the risk of terrorism or the feeling of insecurity terrorism provokes.

Transnational Organized Crime

What is transnational organized crime.

Like terrorism, transnational organized crime is an activity (or tactic). Thus, there is controversy over the specific dimensions of transnational organized crime—every legal jurisdiction defines the concept a little differently ( Allum & Gilmour, 2022 ). Practitioners and academics understand it differently too, with variations appearing depending on whether the writer is a political scientist, economist, or criminologist. Some of the debate and controversy over the relationship between transnational organized crime and terrorism is simply a function of researchers and commentators using terms interchangeably when they in fact vary in their definition, making it challenging to range the relationship ( Picarelli, 2012 ).

International conventions represent the broadest definitional category. Under the United Nations Convention Against Transnational Organized Crime (UNTOC), transnational organized crime are serious crimes carried out by organized criminal groups of more than three individuals, “in order to obtain, directly or indirectly, a financial or other material benefit” ( UNTOC, 2000 , p. 5). To be transnational, criminal activity must occur across interstate borders; this can happen in several ways and is not simply confined to physically moving across an international border. A crime is transnational if a substantial amount of the preparation, planning, or direction took place in a state other than the one in which the crime actually took place, or if the group that committed the crime is active in multiple states ( UNTOC, 2000 ). A crime can also be transnational if it has significant follow-on effects in a second state. This scope is wide enough to compensate for the jurisdictional challenges created by Westphalian sovereignty, and this framing is regularly used by academics as a starting point for their own definitions.

Academic definitions of transnational organized crime vary according to study scope and are largely concentrated on organized crime, tacking on the transnational element as appropriate. Some exceptions exist: Allum and Gilmour (2022) , for example, offered that transnational organized crime is “the passing of illegal goods and/or services over national borders and/or rendering criminal support to criminal activities or related persons in more than one country” (p. 8). Van Dijk and Spapens (2013) viewed transnational organized crime as “a group of actors moving from one country to another to execute illegal activities” (p. 17). More often, authors offer a survey of common organized crime elements. Shelley (2005) identified several themes, including the ongoing nature of the criminal activity, the fact that multiple (at least two) people are involved, and that groups pursue “profit and power” goals through the use of violence or threat of violence ( Shelley 2005 , p. 14). In general agreement, Albanese (2011) also highlighted the literature’s attention to the rational orientation of criminal groups, which propagate themselves through “use of force, threats, monopoly control, and corruption” (p. 4).

One of the most significant mistakes in the discussion of crime and terrorism is the conflation of different types of criminal sophistication. While some definitional debates appear pedantic, this one has real relevance. The misuse of petty, organized, and transnational organized crime creates interventions that are grossly inappropriate for the type and intensity of criminal behavior. In essence, by using the “wrong” term and overestimating the level of criminality, academics and policymakers alike can recommend surgery with a chainsaw over a scalpel. Underestimating the level of sophistication has its own drawbacks, as it can open the door for institutional capture and endemic corruption. In addition, conflation erases the important variations in how terrorist groups engage with different types of crime—for example, those seeking legitimacy are less likely to engage in petty crime but may well involve themselves in organized and transnational crime ( Asal et al., 2019 ). These mistakes can be made from actors as wide ranging as individual academics writing an editorial to intergovernmental organizations drafting policy.

Why Is Transnational Organized Crime a Problem?

The idea that transnational organized crime, and organized crime more generally, represents a national and international security challenge is not new ( Williams, 1994 ). However, following the end of the Cold War and the shift toward globalization, the scale and reach of transnational criminal organizations has grown exponentially. At the individual level, criminal syndicates exploit, extort, and harm people—creating fear and trauma that makes it difficult to invest in the future, trust one’s neighbors, or pursue legitimate enterprise. At the community level, high levels of crime divert public resources into increased law enforcement, drug treatment and deradicalization programs, and safeguarding public officials. Crime also effects communities by decreasing travel and tourism, along with investment from both external and internal entrepreneurs, and skimming off government revenue that should be reinvested into the community. At the state level, crime impacts the workings and reach of institutions, eroding the legitimacy critical for their missions. It undercuts the social contract by demonstrating that the state cannot effectively provide security to its citizens, making the state more vulnerable to overthrow or capture by illegitimate actors ( Williams, 1994 ). The associated corruption (or perceived corruption) of governance actors makes it difficult for the state to act in the international arena, to advance foreign policy interests, and to defend itself against predatory state competitors. Finally, at the international level, a high level of criminality makes other states less like to invest, trade, or engage with a state. A state characterized by powerful criminal actors, particularly transnational ones, can act as a “safe haven” for those groups to avoid disruption and prosecution. This can lead to sanctions, isolation, or even intervention in an attempt to disrupt criminal networks based there. These actions have negative consequences for the civilian population of the state, cause significant amounts of collateral damage, and can result in cyclical violence as power vacuums created by intervention generate increased competition among the remaining actors.

Sophisticated, large scale criminal organizations can outstrip the capabilities of the state they inhabit, creating a dynamic in which legitimate institutions are crowded out and criminality is effectively institutionalized ( Coggins, 2015 ). The World Atlas of Illicit Flows ( Nellemann et al., 2018 ) assessed that 38% of worldwide conflict financing comes from environmental crime alone—suggesting that the true impact of crime on conflict is much broader. Conflict economies centered on criminality, particularly those crimes involving the transportation of goods and people across borders, are key enablers of violence. Even short of war, transnational organized crime creates and sustains violent dynamics that harm the communities in which they are embedded in a multitude of ways.

Types of Transnational Organized Crime

Transnational organized crime is usually organized either by the type of activity or the type of target. The so called “big three” most prevalent and profitable crimes are drugs, arms, and people, followed by cybercrime and environmental crime. Boister and Currie (2014) used three “buckets” to understand transnational crime: substantive crimes (those involving people as products), commodity crimes (those broadly involving the movement or production of illicit goods), and facilitative and organizational crimes (those that allow other forms of criminal activity to occur or be successful). Another way to conceptualize transnational organized crime is to differentiate between origin, transit, and market countries, or where illicit materials begin, move through, and end up. Most illicit goods and profits flow from the developing to the developed world, with the major exception being firearms. Differentiating between these types of crime is important because they have different enabling conditions, spillover effects, and solutions.

Drug trafficking is perhaps the most notorious of all transnational organized crime and has been the target of innumerable domestic and international disruption initiatives. Drugs are a major source of revenue for many types of nonstate (and state) actors. According to the annual World Drug Report produced by the United Nations Office on Drugs and Crime (2021) , drugs can be categorized into five broad categories: cannabis, opioids, cocaine, amphetamine-type stimulants, and new psychoactive substances. The scale of drug usage, markets, and trafficking is staggering: in 2020 , approximately 275 million people used drugs globally ( United Nations Office on Drugs and Crime, 2021 ). Assessing the market is a complicated task, because of the large quantity of drugs as well as the concerted efforts of buyers and sellers to hide their activities, but best-guess estimates place the market at over $1 billion annually ( United Nations Office on Drugs and Crime, 2021 ). Large-scale trafficking requires both organizational sophistication and enabling conditions like weak state institutions, corruption, and relevant labor populations. Because of these factors, states with significant drug production economies are often also home to violent nonstate political actors, or see drug trafficking organizations enter the political realm, resulting in the so-called narco-terrorism phenomenon.

Firearms trafficking, or the illicit movement and sale of guns, is both a form of transnational crime and a key driver of nonstate actor violence. Gun trafficking is a complicated issue in part because the traditional origin and market countries are reversed. Most firearms on the black market are produced licitly in the Global North and then diverted into illicit marketplaces and transactions in the Global South, though markets vary significantly across time and space ( Marsh & Pinson, 2021 ). States are often the merchants or brokers of firearms transactions, making interdiction difficult. As a durable good, large quantities of available illicit guns are those remaining from interstate or civil conflicts, creating an opportunity window for terrorist groups operating in weak (or weakened) states to divert, use, and sell firearms in support of their continued activities. Terrorist groups and transnational organized criminals use firearms both as a tool of violence and as a form of currency, making the buying and selling of weapons a key issue.

Crimes involving people as goods generally fall into two categories: human trafficking and smuggling. While the activities are similar and may overlap, they are distinct. Human smuggling involves individuals paying for covert or illicit transportation, across one or more borders. They are free to leave at their destination or may be able to part ways with the smugglers en route if they wish. Individuals who participate in smuggling are usually migrants seeking to enter a new country without documentation, or people seeking to avoid official attention or a record of their entry into (or exit from) another country ( McAdam & Baumeister, 2010 ).

Human trafficking involves

the recruitment, transportation, transfer, harbouring or receipt of persons, by means of threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation ( United Nations General Assembly, 2000 ).

In essence, trafficked individuals are not free to leave, even if they entered into the arrangement voluntarily ( McAdam & Baumeister, 2010 ). While the majority of trafficking occurs across borders, domestic human trafficking—for the purposes of sex, domestic, and other forms of labor—represents approximately 25% of human trafficking ( United Nations Office on Drugs and Crime, 2012 ). Humans are “durable goods” and represent consistent revenue for illicit organizations. Forced prostitution and sex work are the most widely known aspects of trafficked labor, but sectors like childcare, household cleaning, construction, fishing, or farming are all major destinations for trafficked persons. In addition to producing a profit through their labor or sale, they may also be used as fighters or support staff for terrorist groups. Beyond their labor, trafficked people may be used as “rewards” for loyalty or bravery from terrorist group members. One high-profile example of this dynamic was the enslavement of Yazidi women by ISIS beginning in 2014 ( Vale, 2020 ). Further complicating the issue, smuggled and trafficked people may move along the same routes, by the same facilitators, even in the same shipment.

Intersections Between Transnational Organized Crime and Terrorism

In some contexts, diversifying into transnational crime contributes to a terrorist group’s overall mission. The operational emphasis largely centers on charity groups being used to funnel monies to terrorist groups, a weight that continues today to the exclusion of other sources. It is important to differentiate monies that begin from licit sources and are diverted into terrorist control from funds that originate from illicit activities, because the policy implications and community impacts are significantly different. Terrorist group funding supports direct financial benefitsdistribution to constituent populations, as well as the provision of jobs or social services. Groups can further their goal of political disruption by diverting funds that would otherwise go to the government, particularly in the cases of natural resource theft and tax extortion. By capturing these funds, the terrorist organization effectively reduces the governmental means to fund counterterrorism efforts or fulfill the social contract. Resource diversion in fragile states is particularly harmful: Rai found that the most vulnerable countries to terrorism operate at a $3 trillion to $5 trillion infrastructure deficit, a gap that terrorist groups and disruptive actors actively exploit and increase ( 2017 ). Terrorist groups that disrupt state capacity also reduce legitimacy, worsening the degree of fragility and making the state more vulnerable to illicit capture.

Funding source diversification has become exponentially more important to terrorist groups in the post–9/11 strategic environment, as both international law and financial regulators catch up to “traditional” methods of financing ( Brisard & Martinez, 2014 ). Illicit activity is a huge potential revenue stream, and it makes intuitive sense that terrorist groups would explore existing criminal opportunities in their area of operation. In 2018 , the largest portion of terrorist illicit funds came from the drug trade, followed closely by oil, gasoline, and diesel smuggling ( Nellemann et al., 2018 ). Regional differences alter the proportion of funding streams, but in addition to drugs and fuel, terrorist groups also earn money through taxation/extortion, kidnapping for ransom, human trafficking, arms smuggling, commodities smuggling, and antiquities trafficking. Beyond the direct harm caused by transnational crime, such criminal economies can create an economic incentive for terrorist groups to continue hostilities and resist demobilization ( Cornell, 2007 ).

Greed Versus Grievance Debate

One of the primary justifications for separating transnational organized crime and terrorism linkages is the theorized tension between “greed” (profit motive) and “grievance” (social or ideological motives), a concept borrowed from work by Collier and Hoeffler on civil wars ( 2004 ). In this greed-grievance debate, criminal groups are assumed to be “greedy” actors: largely rational, cost-benefit motivated groups who make operational and organizational choices based on financial considerations. In Hoeffler’s words, criminal groups are “private” actors, interested in personal gain rather than the public good created by government transition ( 2011 ). Terrorist groups, in contrast, are understood as “grievance” actors, who pursue actions based on their ideological or social visions and are ultimately interested in the “public good” of their desired social and political system. Based on these apparently conflicting motivations, it seems unlikely that the two types of groups would work effectively together over the long term.

This presumed divergence undergirds most work conducted before 2001 , and a good deal of the policy literature produced in the early years of the 21st century . However, as the field of terrorism studies attracted more attention in the years following September 11, 2001 , the academic community began to challenge this assumption. In 2004 , Makarenko (2004) argued that the relationship between criminals and terrorists should be more appropriately understood as a spectrum, in which both types of groups learn and adapt based on lessons learned from each other and incorporate the other’s behaviors into their organization. The supposed greed versus grievance debate breaks down further when logistical constraints imposed by stringent terrorism financing measures are considered: some terrorist groups quite literally cannot afford to have moralistic views on illicit activities. Finally, the greed versus grievance cleavage overlooks the human ability to balance competing aims. Criminals can hold political and social views and work to shape their communities like citizens with licit employment, just as terrorist organizations can seek both personal enrichment and political change ( Hutchinson & O’Malley, 2007 ).

Political Activities by Criminal Groups

Political scientists have historically focused on the terrorism side of the crime-terror equation. This imbalance is due to several factors. First, disciplinary boundaries and security studies frameworks steer researchers toward actors with explicitly political goals. Second, it has seemed far less common for criminal groups to diversify into sustained political violence, particularly at an organizational level. Finally, disagreements about “methods or motives” classifications have siloed some of the research, among both academics and policymakers ( Shelley & Picarelli, 2002 ). However, a growing body of scholarship is seeking to address the use of political violence by criminal groups gap ( Phillips, 2018 ). Crime-terror and criminal governance researchers are coming together to build a broader understanding of the political diversification of criminal groups, with a strong emphasis on drug trafficking organizations, particularly those in Latin America ( Blume, 2017 ; Longmire & Longmire, 2008 ; Phillips, 2018 ; Trejo & Ley, 2020 , 2021 ). As a result, criminal political violence is most commonly characterized as a function of “narco-terrorism,” a term first applied to Peru’s Sendero Luminoso in the 1980s ( Shelley, 2014 ). Criminal groups actively seek to influence the political context in which they operate, and some criminal groups do use terrorist tactics to advance their organizational interests. A small number develop broader political ambitions. However, while criminal groups may leverage terrorist tactics, they do not seem to seek wholesale control of the state as terrorist groups do and show willingness to rely on indirect means like corruption and intimidation to coopt state actors.

Violence against political systems and representatives by criminal groups is usually understood as a method to incentivize the state to “leave [them] alone” and allow them to carry out profit seeking activities ( Phillips, 2018 ). Less central is the desire to provide governance benefits, though in some instances criminal groups enforce both formal and informal institutions within their areas of operation ( Feldmann & Mantilla, 2021 ). In keeping with the desire for the state to stay out of their way, political contestation may be violent, but the scope is narrow. Thus, the most common terrorist tactic employed by criminal groups is targeted violence against highly visible individuals. Trejo and Ley (2021) argued that terroristic political assassination is an avenue for criminal groups to consolidate the territorial control necessary for licit and illicit market control, resource extraction through extortion, and establishing a criminal monopoly. They suggested that organized crime (specifically Mexican drug cartels) uses targeted attacks to establish governance regimes, with limited territorial aims.

Types of Relationships

Relationships between criminal and terrorist groups vary greatly across time, space, and organization. They range from transitory to deep enmeshment. Just as there are a range of relationships, so too are there a range of disruption responses, ways to study group interactions, and opportunities to engage with involved actors. Relationships can be conceptualized on a spectrum ( Makarenko, 2004 ), beginning with “ad hoc” before moving to continuing, diversified, and converging dynamics.

Ad Hoc Relationships

The lowest level of interaction between transnational organized crime and terrorism can be characterized as “ad hoc” relationships: interactions or exchanges of goods and services designed to fulfill a specific need. This may be purchasing a falsified passport for a terrorist operative from a counterfeiting ring or paying a terrorist group for the right to transit goods through their area of influence in the same way legitimate businesses pay customs dues to state governments. Examples of this type of relationship abound, but one of the most consistent is the purchase and use of counterfeit documents, as exemplified by Ahmed Ressam, the “Millennium Bomber,” who used both fake French and Canadian passports at various points in his activities ( Hewitt, 2008 ). Hutchinson and O’Malley (2007) argued that ad hoc relationships are the most common because while groups do cooperate based on need, interactions are generally limited for several reasons. Firstly, transnational organized crime groups would rationally perceive terrorist organizations as either a rival or a liability. Further, participating in political violence would be risky business for organized crime, as introducing grievance logics into a “greedy” organization would make the group less profitable and make leadership vulnerable to internal dissent and betrayal. In the same way, incorporating profit motivations into a group with “pure” grievance causes would increase vulnerability to ideological erosion, corruption, and loss of moral legitimacy. For terrorist groups, the loss of externally perceived legitimacy could be particularly devastating—insurgency requires a significant popular support for fighters to remain ahead of government prosecution, a concern shared by terrorist groups ( Tse-tung, 2005 ). Further, the centrality of profit motivation could make it more likely that criminals would betray their terrorist counterparts to the authorities in exchange for a payout. Therefore, terrorist groups may seek out the assistance of criminal groups for specific benefits or in situations where criminal groups dominate the relevant illicit market, but only in situations where cooperation will not compromise political aims ( Hutchinson & O’Malley, 2007 ).

Continuing Relationships

Continuing relationships are often built on ad hoc foundations, where organizations find they need the services of the other group type more consistently than a one-off exchange. Examples of these types of interactions include terrorists paying off powerful criminal groups for the right to create a “safe haven” in their territory or regularly buying guns for their fighters from a trafficking ring. Alternatively, continuing relationships may involve criminal groups paying “taxes” for the right to operate within an area controlled by a terrorist group, as Colombian cocaine cartels did to the Fuerzas Armadas Revolucionarias de Colombia in the 1990s and early 2000s ( Freeman, 2016 ). Finally, continuing relationships include those where the two network types “exchange” criminal assistance, as Italian organized crime did by trafficking arms for North African terrorist groups, in exchange for help for their narcotics trafficking enterprise ( Makarenko & Mesquita, 2014 ). Shelley and Picarelli (2002) argued that both criminal and terrorist groups operate using a network of “loosely organized cells” to maximize operational security and flexibility (p. 307), a format that lends itself to both ad hoc and continuing relationships as individual cells can cooperate based on their specific operational needs. Unsurprisingly, ad hoc and continuing relationships are the most common type of the crime-terrorism nexus in states with developed and sophisticated law enforcement capabilities because they are the most resilient to disruption ( Makarenko & Mesquita, 2014 ).

Diversification

Diversification seems to be most commonly an evolutionary response for terrorist groups squeezed by resource constraints. Pursuing criminal activity can be a reaction to a loss of revenue from another source and so may result from factors like more stringent government counterterrorist financing measures, or the loss of a major sponsor (both private individuals and states). An example of this need-based diversification can be seen in the 1970s Northern Ireland conflict, when the Irish Republican Army (IRA) began “smuggling livestock, cars, and weapons; running protection and extortion rackets; managing underground brothels; orchestrating prison breaks; bank robbery, tax evasion, and construction fraud” in response to losing diaspora funding from increased U.S. law enforcement ( Hamm, 2007 , p. 6). Diversification may also be prompted by the recognition of the benefits of bringing certain criminal capabilities “in house,” thereby eliminating the need for (and vulnerability posed by) relationships with external criminal organizations. Finally, it may also be a result of the increased recruitment of individuals with criminal histories and skills; rank-and-file members may continue to “freelance” while participating in terrorist activities, or leadership may recognize that new recruits represent a new resource and incorporate criminal activities at the organizational level ( Basra & Neumann, 2017 ).

Diversification is similar to continuing relationships in that it involves a more consistent incorporation of opposite-type activities but differs because skills are developed within an organization, rather than presenting as a relationship between two groups. It is distinct from convergence because the diversifying group does not try to balance criminal and political goals; rather, it remains primarily interested in its original mission set. Often diversification for terrorist groups involves seeking the financial benefit of low-priority crimes like cigarette smuggling or intellectual property theft ( Shelley, 2014 ). For example, Boko Haram fighters might traffic and consume tramadol or trade illicitly mined gold, but the group is uninterested in balancing these activities with its larger political aims at the organizational level ( Ogbonnaya, 2020 ; Santacroce et al., 2018 ). For criminal groups, diversification may be prompted by increased competition, either between other criminal groups or from the state. Continued political violence may serve to create or maintain the operational space needed to carry out illicit activities.

Convergence

The merger of criminal groups with terrorist organizations is something of an ahistorical policy bogeyman—much discussed, greatly feared, but (so far) mythical. However, there have been instances of terrorist organizations broadening their strategic interests so completely as to become a transnational criminal enterprise ( Makarenko & Mesquita, 2014 ). Often, convergence is a criminal or terrorist group and may be more appropriately understood as an organization shifting toward governance rather than disruption. Asal et al. (2019) found that insurgent groups that are older and control territory are more likely to diversify into crime, particularly those activities that require building and maintaining physical and administrative infrastructure (like extortion and drugs), as compared to newer organizations. Thus, convergence may be an indicator of a terrorist group “ending” by transitioning to insurgency or devolving into another violence type ( Cronin, 2011 ).

Both diversification and convergence are most common in states experiencing endemic conflict, with weak or nonexistent institutions. It may be more helpful to conceptualize convergence as the relationship moving from distinct organizations into interwoven networks, where individuals are characterized less by in-group identity and more by specific skill sets. One recent example of convergence is the Islamic State (IS). The size and scope of the Islamic State’s area of territorial control made it the wealthiest terrorist group in world history; the group controlled around 34,000 square miles (an area the size of Maine) and earned an estimated $2.9 billion annually, allowing it to be effectively self-sustaining ( Brisard & Martinez, 2014 ; Carter Center Syria Project, 2019 ). IS earns its money through kidnap and ransom, protection money, forced taxation/extortion, oil smuggling, political corruption, and the seizure of existing banks and financial institutions in its area of control ( Brisard & Martinez, 2014 ; Warrick, 2018 ). IS benefits from having a strong organizational structure and experience managing logistics and financial issues that make the group well suited to “converge.”

Enabling Conditions

Often the broader contexts that allow transnational crime and terrorism to flourish are underappreciated in both the academic literature and policy solutions. In part, this is due to scale—Where does one stop when assigning causality? Solving endemic poverty and exclusionary political systems would undoubtably stabilize vulnerable regions and sectors, but such initiatives are often outside the scope of the agencies tasked with disrupting crime-terror intersections. However, there are some variables that significantly increase potential vulnerabilities, expansions, or evolutions because of their enabling capacity and that should be included in any solution or analysis of crime-terror linkages. These include corruption, global illicit flows, state fragility, and lootable resources.

Corruption—the misuse of public office through the giving or withholding of an advantage by a public official—facilitates a variety of disruptive activities, including transnational organized crime and terrorism ( UNTOC, 2000 ). Corruption enables both profit and logistical support activities for illicit groups, even in geographic areas that are not operational targets. For terrorist groups, corruption can create a “policy window” through which they can position themselves as a legitimate alternative to existing institutions, a way to circumvent investigations or prosecutions, and an opportunity for kinetic attacks ( Shelley, 2014 ). Purely criminal groups also benefit from corruption. This connection is more widely acknowledged; under the UNTOC for example, corruption is recognized as a key condition of transnational organized crime, and signatories to the accord must adopt domestic legislation criminalizing corruption ( UNTOC, 2000 ). For groups that combine profit-motivated illicit activities with political disruption, corrupt officials and institutions are key enablers of their continued success.

Illicit Financial Flows

Illicit financial flows, defined as “money that is illegally earned, transferred, or utilized” (Issues: Illicit Financial Flows), inhibit a state’s ability to raise, retain, and invest domestic resources ( Organisation for Economic Cooperation and Development [OECD] and United Nations Office on Drugs and Crime [UNODC], 2016 ). Examples of these kinds of flows include funds with criminal origins (such as the proceeds of a crime), funds with a criminal destination (such as bribery, terrorist financing, or conflict financing), commercial tax evasion, mis-invoicing of consumer goods, and the trafficking of humans or goods. Illicit flows are also transfers to, by, or for entities subject to financial sanctions under UN Security Council Resolutions and transfers that seek to evade anti–money laundering or counterterrorism financing measures ( OECD and UNODC, 2016 ). 2 Monies that should have been invested into local populations are diverted, bypassing currency controls, tax regulations, and law enforcement oversight. While illicit flows have a clear relationship with criminal groups, they also directly intersect with terrorist group capability: illicit flows gift terrorist groups with improved “freedom of action” and widen the scope of both tactical and strategic considerations ( Comolli, 2018 ). Tracking and limiting illicit financial flows is challenging because they occur within the larger global financial system.

Fragile States

Fragile states are countries with low capacity and legitimacy, poor provision of public goods, weak institutions, uneven governance, and an anemic social contract between the state and citizen ( Miraglia et al., 2012 ; USAID, 2005 ). Some are caught in cycles of internal violence and all experience high levels of criminality, making them vulnerable to penetration by illicit actors. Fragile states cannot project power throughout their whole territory, creating governance vacuums transnational organized crime and terrorist groups can exploit. Thus, fragile states act as safe havens and areas of cooperation, even for groups that are not permanently located there. They also serve the important function of logistical nodes that allow shipments of illicit goods to be “laundered” during their movement from origin to market country ( Miraglia et al., 2012 ). Fragile states often are collocated with other enabling conditions such as corruption and lootable resources.

Lootable Resources

Beyond “traditional” illicit goods like firearms and people, terrorist and criminal groups also exploit natural resources. Lootable resources, or natural assets that are highly profitable and easy to sell, have been extensively linked to nonstate actor violence and civil conflicts ( Cheng, 2018 ; Findley & Marineau, 2015 ; Fortna et al., 2018 ). They may even act as direct drivers for terrorist activity: Fortna et al. found that because such funding sources reduce the need for violent nonstate actors to rely on domestic populations for support, groups are more likely to turn to terrorism ( 2018 ). Examples of such goods include diamonds, timber, oil, and drugs. Lootable resources extend conflict duration, increase other enabling factors like corruption, and make it more likely that third-party states will intervene in the conflict ( Fearon, 2004 ; Findley & Marineau, 2015 ). While entering the market for these goods is “easy” for illicit actors because of the high level of demand and unevenly regulated international marketplaces, it still requires criminal knowledge and capability, making lootable resources a major intersection point for transnational crime and terrorism.

Responding to Terrorism and Transnational Organized Crime

Responses to transnational crime and terrorism have historically been uneven, both geographically and politically. Most interventions have focused on the developing world and been executed through state and military actors. This pattern occurs because Global North countries generally prefer to disrupt illicit networks “over there,” without applying equivalent effort to their own role as facilitators, perpetrators, and markets. By externalizing the threat, and by consistently framing themselves as “markets” where problematic products and political activity are sent, they reduce the need to examine domestic policies and dynamics. However, demand is key, and responses must account for underlying and enabling conditions that allow crime-terror relationships to emerge and evolve.

There are some actionable steps both domestic governments and international institutions can pursue that would make the escalation of the relationship less successful. Any efforts to respond to terrorist-crime linkages must be a “whole government” approach that includes actors and departments that are not traditionally understood to have a counterterrorism mission because they have unique strengths and leverage over a multifaceted problem. Further, states can treat large terrorist groups with major financial assets like states by sanctioning linked businesses and pushing them out of the international monetary system. Terrorist groups are less successful at illicit activity than professional criminals, which provides an opportunity for interdiction and disruption ( Irwin et al., 2012 ). Continued cooperation and government oversight of anti–money laundering efforts increases the likelihood that illicit financial activity would be detected. Effective, high-profile prosecution of corruption would also pay significant dividends by making the operational environment less hospitable to illicit actors.

Part of the policy challenge is that international law enforcement does not functionally exist. While there are many cooperative agreements between individual states, and WEIRD countries can pursue unilateral intervention in developing countries, sovereignty dictates there is no independent global police force. Investigation, prosecution, and disruption efforts are centered on the tails of the criminal-terrorist bell curve: high profile leaders like Pablo Escobar or Osama Bin Ladin, or on rank-and-file members who may have sought to traffic illicit arms across the Sahel or travel to join al-Nusra in Syria. The heart of the relationship, however, is the middle management of both group types. Challenging some of the precepts of Westphalian sovereignty by developing a more robust structure for international investigation and prosecution may be an effective response to disincentivizing crime-terror relationships. This would also help to mitigate the “safe haven” challenge of uneven state capabilities.

Disrupting trafficking routes serves to inhibit both operational and logistical aims of violent nonstate actors. States, professional bodies, and international organizations have the power to require consistent documentation requirements for goods, or at least the most abused commodities like precious minerals, oil, or timber. Another avenue of disruption is in the increased scrutiny of nonintuitive shipments, specifically a closer examination of goods being shipped by companies with no history or logical need to trade in such goods or using inappropriate methods of transport ( Delston & Walls, 2009 ).

Looking Ahead

Both transnational criminals and terrorist networks are innovative, adaptive types of organizations, and it makes intuitive sense that they would pioneer new ways of circumventing obstacles. However, while the intersection may be inevitable, integration is not. Not all terrorist groups will have the opportunity or inclination to diversify or ally with transnational criminal networks. As proto-state actors seeking to demonstrate their “qualifications” as governance actors, some groups will eschew or even attack criminal groups. Others lack a criminal infrastructure in their area of operation to link up with; this is particularly true for areas characterized by illicit activities with low labor requirements. Finally, still others will determine that such associations would bring unnecessary scrutiny by domestic and international law enforcement. From the criminal side, many of the same logics apply: some transnational criminal groups avoid significant or lasting relationships with terrorist groups because of concerns regarding official scrutiny. Others may be engaged in breaking domestic and international laws but have strong political preferences or affiliations and do not want the existing government overthrown ( Hutchinson & O’Malley, 2007 ). A desire for governmental stability may also be a function of logistical concerns—if you have already bought the judge (or customs officials, border guards, prison staff, etc.), shooting them is counterproductive and bad business.

To effectively develop workable solutions, policymakers, academics, and law enforcement must confront the reality that globalization is not an unmitigated good. Greater international integration, increased technology, and the dramatically increased flows of goods and people makes everything move more easily, which includes criminality and political violence. WEIRD countries must acknowledge their role as demand markets and financial havens that “pull” illicit flows of criminal funds and goods out of the developing world, creating an unintentional revenue stream for violent nonstate actors.

As avenues for terrorism financing continue to constrict and state governments in the developing world gain capacity, intersections between transnational criminal groups and terrorist organizations will persist. Those interested in disruption need to think long and hard about how to address the challenges of sovereignty in a world that currently (and necessarily) extends the protections of borders to actors who circumvent them with ease.

Further Reading

  • Ahmad, A. (2017). Jihad & Co.: Black markets and Islamist power . Oxford University Press.
  • Dishman, C. (2005). The leaderless nexus: When crime and terror converge . Studies in Conflict and Terrorism , 28 (3), 237–252.
  • Felbab-Brown, V. (2019). The crime–terror nexus and its fallacies . In E. Chenoweth , R. English , A. Gofas , & S. Kalyvas (Eds.), The Oxford handbook of terrorism (pp. 365–382). Oxford University Press.
  • Lessing, B. (2018). Making peace in drug wars: Crackdowns and cartels in Latin America . Cambridge University Press.
  • Petrich, K. (2019). Cows, charcoal, and cocaine: Al-Shabaab’s criminal activities in the Horn of Africa . Studies in Conflict & Terrorism , 45 (5–6), 479–500.
  • Sanderson, T. (2004). Transnational terror and organized crime: Blurring the lines . SAIS Review of International Affairs , 24 (1), 49–61.
  • Traughber, C. (2007). Terror-crime nexus? Terrorism and arms, drug, and human trafficking in Georgia . Connections , 6 (1), 47–64.
  • Wang, P. (2010). The crime-terror nexus: Transformation, alliance, convergence . Asian Social Science , 6 (6), 11–20.
  • Albanese, J. (2011). Organized crime in our times . Elsevier.
  • Aliu, M. , Bektashi, M. , Sahiti, A. , & Sahiti, A. (2017). A review of sources on terrorist financing. Juridica , 13 (1), 97–108.
  • Allum, F. , & S. Gilmour , (Eds.). (2022). The Routledge handbook of transnational organized crime . Routledge.
  • Andreas, P. , & Greenhill, K. (2010). Sex, drugs, and body counts: The politics of numbers in global crime and conflict . Cornell University Press.
  • Asal, A. , Rethemeyer, R. , & Schoon, E. (2019). Crime, conflict and the legitimacy trade-off: Explaining variation in insurgents’ Participation in Crime . Journal of Politics , 81 (2), 399–410.
  • Basra, R. , & Neumann, P. (2017). Crime as Jihad: Developments in the crime-terror nexus in Europe . CTC Sentinel , 10 (9), 1–6.
  • Blume, L. (2017). The old rules no longer apply: Explaining narco-assassinations of Mexican politicians . Journal of Politics in Latin America , 9 (1), 59–90.
  • Boister, N. , & Currie, R. J. (2014). Routledge handbook of transnational criminal law . Routledge.
  • Brisard, J. C. , & Martinez, D. (2014). Islamic State: The economy-based terrorist funding . Thomson Reuters Accelus.
  • Carter Center Syria Project . (2019). A review of ISIS in Syria: 2016–2019 (pp. 1–22). The Carter Center.
  • Chaliand, G. , & Blin, A. (2016). Zealots and assassins . In G. Chaliand (Ed.), The history of terrorism (pp. 55–78). University of California Press.
  • Cheng, C. (2018). Extralegal groups in post-conflict Liberia: How trade makes the state . Oxford University Press.
  • Coggins, B. L. (2015). Does state failure cause terrorism? An empirical analysis (1999–2008) . Journal of Conflict Resolution , 59 (3), 455–483.
  • Collier, P. , & Hoeffler, A. (2004). Greed and grievance in civil war . Oxford Economic Papers , 56 (4), 563–595.
  • Comolli, V. (Ed.). (2018). Organized crime and illicit trade: How to respond to this strategic challenge in old and new domains . Palgrave Macmillan.
  • Cornell, S. E. (2007). Narcotics and armed conflict: Interaction and implications . Studies in Conflict & Terrorism , 30 (3), 207–227.
  • Cronin, A. (2011). How terrorism ends: Understanding the decline and demise of terrorist campaigns . Princeton University Press.
  • Delston, R. S. , & Walls, S. C. (2009). Reaching beyond banks: How to target trade-based money laundering and terrorist financing outside the financial sector. Case Western Reserve Journal of International Law , 41 (1), 85–118.
  • Fearon, J. D. (2004). Why do some civil wars last so much longer than others? Journal of Peace Research , 41 (3), 275–301.
  • Feldmann, A. , & Mantilla, J. (2021). Criminal governance in Latin America. In H. Pontell (Ed.), Oxford Research Encyclopedia of Criminology and Criminal Justice . (pp. 1–25). Oxford University Press.
  • Findley, M. G. , & Marineau, J. F. (2015). Lootable resources and third-party intervention into civil wars . Conflict Management and Peace Science , 32 (5), 465–486.
  • Fortna, V. P. , Lotito, N. J. , & Rubin, M. A. (2018). Don’t bite the hand that feeds: Rebel funding sources and the use of terrorism in civil wars . International Studies Quarterly , 62 (4), 782–794.
  • Freeman, M. (2016). Financing terrorism: Case studies . Routledge.
  • Ganor, B. (2002). Defining terrorism: Is one man’s terrorist another man’s freedom fighter? Police Practice and Research , 3 (4), 287–304.
  • Hamm, M. (2007). Terrorism As Crime: From Oklahoma City to Al-Qaeda and Beyond . New York University Press.
  • Henrich, J. , Heine, S. J. , & Norenzayan, A. (2010). The weirdest people in the world? Behavioral and Brain Sciences , 33 (2–3), 61–83.
  • Hewitt, S. (2008). ‘Strangely Easy to Obtain’: Canadian Passport Security, 1933–73 . Intelligence and National Security 23 (3), 381-405.
  • Hoeffler, A. (2011). “Greed” versus “grievance”: A useful conceptual distinction in the study of civil war? Studies in Ethnicity and Nationalism , 11 (2), 274–284.
  • Hutchinson, S. , & O’Malley, P. (2007). A Crime-Terror Nexus? Thinking on some of the links between terrorism and criminality . Studies in Conflict and Terrorism , 30 (12), 1095–1107.
  • Irwin, A. S. M. , Choo, K. K. R. , & Liu, L. (2012). An analysis of money laundering and terrorism financing typologies . Journal of Money Laundering Control , 15 (1), 85–111.
  • Issues: Illicit Financial Flows . (2015, November 2). Illicit Financial Flows .
  • Kenner, D. (2019, March 24). All ISIS has left is money. Lots of it . The Atlantic .
  • Laqueur, W. (2001). A history of terrorism . Transaction.
  • Longmire, S. , & Longmire, J. (2008). Redefining terrorism: Why Mexican drug trafficking is more than just organized crime . Journal of Strategic Security , 1 (1), 35–52.
  • Makarenko, T. (2004). The crime-terror continuum: Tracing the interplay between transnational organised crime and terrorism . Global Crime , 6 (1), 129–145.
  • Makarenko, T. , & Mesquita, M. (2014). Categorising the crime–terror nexus in the European Union . Global Crime , 15 (3–4), 259–274.
  • Marsh, N. , & Pinson, L. (2021). Arms trafficking . In M. Gallien & F. Weigard (Eds.), The Routledge handbook of smuggling (pp. 213–227). Routledge.
  • McAdam, M. , & Baumeister, S. (2010). A short introduction to migrant smuggling (pp. 1–29) [Issue Paper]. United Nations Office on Drugs and Crime.
  • Miraglia, P. , Ochoa, R. , & Briscoe, I. (2012). Transnational organised crime and fragile states (WP 5/2012). Organization for Economic Cooperation and Development.
  • Mueller, J. , & Stewart, M. G. (2018). Terrorism and bathtubs: Comparing and assessing the risks . Terrorism and Political Violence , 33 (1), 138–163.
  • National Consortium for the Study of Terrorism and Responses to Terrorism (START) . (2019). Global Terrorism Database (GTD) codebook .
  • Nellemann, C. , Henriksen, R. , Pravettoni, R. , Stewart, D. , Kotsovou, M. , Schlingemann, M. A. J. , Shaw, M. , & Reitano, T. (Eds.). (2018). World atlas of illicit flows . INTERPOL, RHIPTO, & the Global Initiative Against Transnational Organized Crime.
  • Ogbonnaya, M. (2020). Illegal mining and rural banditry in North West Nigeria (pp. 1–12) [Policy Brief]. ENACT Africa.
  • Organization for Economic Cooperation and Development (OECD) and United Nations Office on Drugs and Crime . (2016). Coherent policies for combatting illicit financial flows [Issue Brief],. Inter-Agency Task Force on Financing for Development.
  • Phillips, B. (2018). Terrorist tactics by criminal organizations: The mexican case in context . Perspectives on Terrorism , 12 (1), 46–63.
  • Picarelli, J. (2012). Osama bin Corleone? Vito the Jackal? Framing threat convergence through an examination of transnational organized crime and international terrorism . Terrorism and Political Violence 24 (2), 180–198.
  • Rai, S. (2017). The spectre of illicit financial flows: Undermining justice . Centre for Budget and Governance Accountability, (p. 26).
  • Reed, Q. , & Fontana, A. (2011). Corruption and illicit financial flows . [U4 Issue], Chr. Michelsen Institute.
  • Ritchie, H. , Hasell, J. , Appel, C. , & Roser, M. (2019). Terrorism . Our World in Data.
  • Santacroce, R. , Bosio, E. , Scioneri, V. , & Mignone, M. (2018). The new drugs and the sea: The phenomenon of narco-terrorism . International Journal of Drug Policy , 51 , 67–68.
  • Saul, B. (2019). Defining terrorism: A conceptual minefield . In E. Chenoweth , R. English , A. Gofas , & S. N. Kalyvas (Eds.), The Oxford handbook of terrorism (pp. 33–49). Oxford University Press.
  • Schmid, A. P. (2018). Revisiting the relationship between international terrorism and transnational organised crime 22 years later . [ICCT Research Paper], International Centre for Counter-Terrorism.
  • Schneier, B. (2008, April 3). The difference between feeling and reality in security . Wired .
  • Shelley, L. (2005). The unholy trinity: Transnational crime, corruption, and terrorism . Brown Journal of World Affairs , 11 (2), 101–111.
  • Shelley, L. (2014). Dirty entanglements: Corruption, crime, and terrorism . Cambridge University Press.
  • Shelley, L. , & Picarelli, J. (2002). Methods not motives: Implications of the convergence of international organized crime and terrorism . Police Practice and Research , 3 (4), 305–318.
  • Silke, A. (1998). In defense of the realm: Financing loyalist terrorism in Northern Ireland—Part one: Extortion and blackmail . Studies in Conflict & Terrorism , 21 (4), 331–361.
  • Trejo, G. , & Ley, S. (2021). High-profile criminal violence: Why drug cartels murder government officials and party candidates in Mexico . British Journal of Political Science , 51 (1), 203–229.
  • Trejo, G. & Ley, S. (2020). Votes, Drugs, and Violence: The Political Logic of Criminal Wars in Mexico . Cambridge University Press.
  • Tse-tung, M. (2005). On guerrilla warfare ( S. B. Griffith , Trans.). University of Illinois Press.
  • United Nations Convention Against Transnational Organized Crime . (2000). United Nations Convention Against Transnational Organized Crime and the Protocols Thereto (UNTOC), General Assembly Resolution 55/25 .
  • United Nations General Assembly . (2000). Protocol to prevent, suppress and punish trafficking in persons, especially women and children, supplementing the United Nations Convention Against Transnational Organized Crime .
  • United Nations Office on Drugs and Crime . (2012). Global report on trafficking in persons, 2012 .
  • United Nations Office on Drugs and Crime . (2021). World drug report 2021 .
  • USAID . (2005). The USAID Fragile States Assessment Framework (pp. 1–40).
  • Vale, G. (2020). Liberated, not free: Yazidi women after Islamic State captivity . Small Wars & Insurgencies , 31 (3), 511–539.
  • Van Dijk, T. , & Spapens, T. (2013). Transnational crime networks across the world. In J. Albanese & P. Reichel (Eds.), Transnational organized crime: An overview from six continents . SAGE.
  • Warrick, J. (2018, December 21). Retreating ISIS army smuggled a fortune in cash and gold out of Iraq and Syria . The Washington Post .
  • Williams, P. (1994). Transnational criminal organisations and international security . Survival , 36 (1), 96–113.

1. WEIRD stands for Western, Educated, Industrial, Rich, and Democratic states and has been suggested as an alternative to problematic terms like “First World” or “developed,” which suggest some countries are more evolved or have reached a completed stage, rather than remaining dynamic entities.

2. It is important to note that illicit flows are distinct from informal flows, which include legitimate international monetary transfers (usually remittances from workers abroad to families at home) which may not transit through a formal bank ( Reed & Fontana, 2011 ). Informal flows can be made illicit, however, by the involvement of terrorist or criminal actors. For example, one of the ways ISIS both makes and integrates money is by transforming informal flows into illicit flows. The group reportedly manages millions of dollars in hawala transactions every week ( Kenner, 2019 ). In the case of ISIS, participation in hawala allows it to circumvent international sanctions, Syria’s collapsed formal banking industry, and external scrutiny, in addition to serving as a revenue stream.

Related Articles

  • Crime: The Illicit Global Political Economy
  • International Organization and Terrorism

Printed from Oxford Research Encyclopedias, International Studies. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 07 June 2024

  • Cookie Policy
  • Privacy Policy
  • Legal Notice
  • Accessibility
  • [66.249.64.20|185.80.151.9]
  • 185.80.151.9

Character limit 500 /500

  • Search Menu

Sign in through your institution

  • Browse content in Arts and Humanities
  • Browse content in Archaeology
  • Anglo-Saxon and Medieval Archaeology
  • Archaeological Methodology and Techniques
  • Archaeology by Region
  • Archaeology of Religion
  • Archaeology of Trade and Exchange
  • Biblical Archaeology
  • Contemporary and Public Archaeology
  • Environmental Archaeology
  • Historical Archaeology
  • History and Theory of Archaeology
  • Industrial Archaeology
  • Landscape Archaeology
  • Mortuary Archaeology
  • Prehistoric Archaeology
  • Underwater Archaeology
  • Zooarchaeology
  • Browse content in Architecture
  • Architectural Structure and Design
  • History of Architecture
  • Residential and Domestic Buildings
  • Theory of Architecture
  • Browse content in Art
  • Art Subjects and Themes
  • History of Art
  • Industrial and Commercial Art
  • Theory of Art
  • Biographical Studies
  • Byzantine Studies
  • Browse content in Classical Studies
  • Classical History
  • Classical Philosophy
  • Classical Mythology
  • Classical Literature
  • Classical Reception
  • Classical Art and Architecture
  • Classical Oratory and Rhetoric
  • Greek and Roman Epigraphy
  • Greek and Roman Law
  • Greek and Roman Papyrology
  • Greek and Roman Archaeology
  • Late Antiquity
  • Religion in the Ancient World
  • Digital Humanities
  • Browse content in History
  • Colonialism and Imperialism
  • Diplomatic History
  • Environmental History
  • Genealogy, Heraldry, Names, and Honours
  • Genocide and Ethnic Cleansing
  • Historical Geography
  • History by Period
  • History of Emotions
  • History of Agriculture
  • History of Education
  • History of Gender and Sexuality
  • Industrial History
  • Intellectual History
  • International History
  • Labour History
  • Legal and Constitutional History
  • Local and Family History
  • Maritime History
  • Military History
  • National Liberation and Post-Colonialism
  • Oral History
  • Political History
  • Public History
  • Regional and National History
  • Revolutions and Rebellions
  • Slavery and Abolition of Slavery
  • Social and Cultural History
  • Theory, Methods, and Historiography
  • Urban History
  • World History
  • Browse content in Language Teaching and Learning
  • Language Learning (Specific Skills)
  • Language Teaching Theory and Methods
  • Browse content in Linguistics
  • Applied Linguistics
  • Cognitive Linguistics
  • Computational Linguistics
  • Forensic Linguistics
  • Grammar, Syntax and Morphology
  • Historical and Diachronic Linguistics
  • History of English
  • Language Acquisition
  • Language Evolution
  • Language Reference
  • Language Variation
  • Language Families
  • Lexicography
  • Linguistic Anthropology
  • Linguistic Theories
  • Linguistic Typology
  • Phonetics and Phonology
  • Psycholinguistics
  • Sociolinguistics
  • Translation and Interpretation
  • Writing Systems
  • Browse content in Literature
  • Bibliography
  • Children's Literature Studies
  • Literary Studies (Asian)
  • Literary Studies (European)
  • Literary Studies (Eco-criticism)
  • Literary Studies (Romanticism)
  • Literary Studies (American)
  • Literary Studies (Modernism)
  • Literary Studies - World
  • Literary Studies (1500 to 1800)
  • Literary Studies (19th Century)
  • Literary Studies (20th Century onwards)
  • Literary Studies (African American Literature)
  • Literary Studies (British and Irish)
  • Literary Studies (Early and Medieval)
  • Literary Studies (Fiction, Novelists, and Prose Writers)
  • Literary Studies (Gender Studies)
  • Literary Studies (Graphic Novels)
  • Literary Studies (History of the Book)
  • Literary Studies (Plays and Playwrights)
  • Literary Studies (Poetry and Poets)
  • Literary Studies (Postcolonial Literature)
  • Literary Studies (Queer Studies)
  • Literary Studies (Science Fiction)
  • Literary Studies (Travel Literature)
  • Literary Studies (War Literature)
  • Literary Studies (Women's Writing)
  • Literary Theory and Cultural Studies
  • Mythology and Folklore
  • Shakespeare Studies and Criticism
  • Browse content in Media Studies
  • Browse content in Music
  • Applied Music
  • Dance and Music
  • Ethics in Music
  • Ethnomusicology
  • Gender and Sexuality in Music
  • Medicine and Music
  • Music Cultures
  • Music and Religion
  • Music and Media
  • Music and Culture
  • Music Education and Pedagogy
  • Music Theory and Analysis
  • Musical Scores, Lyrics, and Libretti
  • Musical Structures, Styles, and Techniques
  • Musicology and Music History
  • Performance Practice and Studies
  • Race and Ethnicity in Music
  • Sound Studies
  • Browse content in Performing Arts
  • Browse content in Philosophy
  • Aesthetics and Philosophy of Art
  • Epistemology
  • Feminist Philosophy
  • History of Western Philosophy
  • Metaphysics
  • Moral Philosophy
  • Non-Western Philosophy
  • Philosophy of Science
  • Philosophy of Language
  • Philosophy of Mind
  • Philosophy of Perception
  • Philosophy of Action
  • Philosophy of Law
  • Philosophy of Religion
  • Philosophy of Mathematics and Logic
  • Practical Ethics
  • Social and Political Philosophy
  • Browse content in Religion
  • Biblical Studies
  • Christianity
  • East Asian Religions
  • History of Religion
  • Judaism and Jewish Studies
  • Qumran Studies
  • Religion and Education
  • Religion and Health
  • Religion and Politics
  • Religion and Science
  • Religion and Law
  • Religion and Art, Literature, and Music
  • Religious Studies
  • Browse content in Society and Culture
  • Cookery, Food, and Drink
  • Cultural Studies
  • Customs and Traditions
  • Ethical Issues and Debates
  • Hobbies, Games, Arts and Crafts
  • Natural world, Country Life, and Pets
  • Popular Beliefs and Controversial Knowledge
  • Sports and Outdoor Recreation
  • Technology and Society
  • Travel and Holiday
  • Visual Culture
  • Browse content in Law
  • Arbitration
  • Browse content in Company and Commercial Law
  • Commercial Law
  • Company Law
  • Browse content in Comparative Law
  • Systems of Law
  • Competition Law
  • Browse content in Constitutional and Administrative Law
  • Government Powers
  • Judicial Review
  • Local Government Law
  • Military and Defence Law
  • Parliamentary and Legislative Practice
  • Construction Law
  • Contract Law
  • Browse content in Criminal Law
  • Criminal Procedure
  • Criminal Evidence Law
  • Sentencing and Punishment
  • Employment and Labour Law
  • Environment and Energy Law
  • Browse content in Financial Law
  • Banking Law
  • Insolvency Law
  • History of Law
  • Human Rights and Immigration
  • Intellectual Property Law
  • Browse content in International Law
  • Private International Law and Conflict of Laws
  • Public International Law
  • IT and Communications Law
  • Jurisprudence and Philosophy of Law
  • Law and Politics
  • Law and Society
  • Browse content in Legal System and Practice
  • Courts and Procedure
  • Legal Skills and Practice
  • Primary Sources of Law
  • Regulation of Legal Profession
  • Medical and Healthcare Law
  • Browse content in Policing
  • Criminal Investigation and Detection
  • Police and Security Services
  • Police Procedure and Law
  • Police Regional Planning
  • Browse content in Property Law
  • Personal Property Law
  • Study and Revision
  • Terrorism and National Security Law
  • Browse content in Trusts Law
  • Wills and Probate or Succession
  • Browse content in Medicine and Health
  • Browse content in Allied Health Professions
  • Arts Therapies
  • Clinical Science
  • Dietetics and Nutrition
  • Occupational Therapy
  • Operating Department Practice
  • Physiotherapy
  • Radiography
  • Speech and Language Therapy
  • Browse content in Anaesthetics
  • General Anaesthesia
  • Neuroanaesthesia
  • Browse content in Clinical Medicine
  • Acute Medicine
  • Cardiovascular Medicine
  • Clinical Genetics
  • Clinical Pharmacology and Therapeutics
  • Dermatology
  • Endocrinology and Diabetes
  • Gastroenterology
  • Genito-urinary Medicine
  • Geriatric Medicine
  • Infectious Diseases
  • Medical Toxicology
  • Medical Oncology
  • Pain Medicine
  • Palliative Medicine
  • Rehabilitation Medicine
  • Respiratory Medicine and Pulmonology
  • Rheumatology
  • Sleep Medicine
  • Sports and Exercise Medicine
  • Clinical Neuroscience
  • Community Medical Services
  • Critical Care
  • Emergency Medicine
  • Forensic Medicine
  • Haematology
  • History of Medicine
  • Browse content in Medical Dentistry
  • Oral and Maxillofacial Surgery
  • Paediatric Dentistry
  • Restorative Dentistry and Orthodontics
  • Surgical Dentistry
  • Browse content in Medical Skills
  • Clinical Skills
  • Communication Skills
  • Nursing Skills
  • Surgical Skills
  • Medical Ethics
  • Medical Statistics and Methodology
  • Browse content in Neurology
  • Clinical Neurophysiology
  • Neuropathology
  • Nursing Studies
  • Browse content in Obstetrics and Gynaecology
  • Gynaecology
  • Occupational Medicine
  • Ophthalmology
  • Otolaryngology (ENT)
  • Browse content in Paediatrics
  • Neonatology
  • Browse content in Pathology
  • Chemical Pathology
  • Clinical Cytogenetics and Molecular Genetics
  • Histopathology
  • Medical Microbiology and Virology
  • Patient Education and Information
  • Browse content in Pharmacology
  • Psychopharmacology
  • Browse content in Popular Health
  • Caring for Others
  • Complementary and Alternative Medicine
  • Self-help and Personal Development
  • Browse content in Preclinical Medicine
  • Cell Biology
  • Molecular Biology and Genetics
  • Reproduction, Growth and Development
  • Primary Care
  • Professional Development in Medicine
  • Browse content in Psychiatry
  • Addiction Medicine
  • Child and Adolescent Psychiatry
  • Forensic Psychiatry
  • Learning Disabilities
  • Old Age Psychiatry
  • Psychotherapy
  • Browse content in Public Health and Epidemiology
  • Epidemiology
  • Public Health
  • Browse content in Radiology
  • Clinical Radiology
  • Interventional Radiology
  • Nuclear Medicine
  • Radiation Oncology
  • Reproductive Medicine
  • Browse content in Surgery
  • Cardiothoracic Surgery
  • Gastro-intestinal and Colorectal Surgery
  • General Surgery
  • Neurosurgery
  • Paediatric Surgery
  • Peri-operative Care
  • Plastic and Reconstructive Surgery
  • Surgical Oncology
  • Transplant Surgery
  • Trauma and Orthopaedic Surgery
  • Vascular Surgery
  • Browse content in Science and Mathematics
  • Browse content in Biological Sciences
  • Aquatic Biology
  • Biochemistry
  • Bioinformatics and Computational Biology
  • Developmental Biology
  • Ecology and Conservation
  • Evolutionary Biology
  • Genetics and Genomics
  • Microbiology
  • Molecular and Cell Biology
  • Natural History
  • Plant Sciences and Forestry
  • Research Methods in Life Sciences
  • Structural Biology
  • Systems Biology
  • Zoology and Animal Sciences
  • Browse content in Chemistry
  • Analytical Chemistry
  • Computational Chemistry
  • Crystallography
  • Environmental Chemistry
  • Industrial Chemistry
  • Inorganic Chemistry
  • Materials Chemistry
  • Medicinal Chemistry
  • Mineralogy and Gems
  • Organic Chemistry
  • Physical Chemistry
  • Polymer Chemistry
  • Study and Communication Skills in Chemistry
  • Theoretical Chemistry
  • Browse content in Computer Science
  • Artificial Intelligence
  • Computer Architecture and Logic Design
  • Game Studies
  • Human-Computer Interaction
  • Mathematical Theory of Computation
  • Programming Languages
  • Software Engineering
  • Systems Analysis and Design
  • Virtual Reality
  • Browse content in Computing
  • Business Applications
  • Computer Security
  • Computer Games
  • Computer Networking and Communications
  • Digital Lifestyle
  • Graphical and Digital Media Applications
  • Operating Systems
  • Browse content in Earth Sciences and Geography
  • Atmospheric Sciences
  • Environmental Geography
  • Geology and the Lithosphere
  • Maps and Map-making
  • Meteorology and Climatology
  • Oceanography and Hydrology
  • Palaeontology
  • Physical Geography and Topography
  • Regional Geography
  • Soil Science
  • Urban Geography
  • Browse content in Engineering and Technology
  • Agriculture and Farming
  • Biological Engineering
  • Civil Engineering, Surveying, and Building
  • Electronics and Communications Engineering
  • Energy Technology
  • Engineering (General)
  • Environmental Science, Engineering, and Technology
  • History of Engineering and Technology
  • Mechanical Engineering and Materials
  • Technology of Industrial Chemistry
  • Transport Technology and Trades
  • Browse content in Environmental Science
  • Applied Ecology (Environmental Science)
  • Conservation of the Environment (Environmental Science)
  • Environmental Sustainability
  • Environmentalist Thought and Ideology (Environmental Science)
  • Management of Land and Natural Resources (Environmental Science)
  • Natural Disasters (Environmental Science)
  • Nuclear Issues (Environmental Science)
  • Pollution and Threats to the Environment (Environmental Science)
  • Social Impact of Environmental Issues (Environmental Science)
  • History of Science and Technology
  • Browse content in Materials Science
  • Ceramics and Glasses
  • Composite Materials
  • Metals, Alloying, and Corrosion
  • Nanotechnology
  • Browse content in Mathematics
  • Applied Mathematics
  • Biomathematics and Statistics
  • History of Mathematics
  • Mathematical Education
  • Mathematical Finance
  • Mathematical Analysis
  • Numerical and Computational Mathematics
  • Probability and Statistics
  • Pure Mathematics
  • Browse content in Neuroscience
  • Cognition and Behavioural Neuroscience
  • Development of the Nervous System
  • Disorders of the Nervous System
  • History of Neuroscience
  • Invertebrate Neurobiology
  • Molecular and Cellular Systems
  • Neuroendocrinology and Autonomic Nervous System
  • Neuroscientific Techniques
  • Sensory and Motor Systems
  • Browse content in Physics
  • Astronomy and Astrophysics
  • Atomic, Molecular, and Optical Physics
  • Biological and Medical Physics
  • Classical Mechanics
  • Computational Physics
  • Condensed Matter Physics
  • Electromagnetism, Optics, and Acoustics
  • History of Physics
  • Mathematical and Statistical Physics
  • Measurement Science
  • Nuclear Physics
  • Particles and Fields
  • Plasma Physics
  • Quantum Physics
  • Relativity and Gravitation
  • Semiconductor and Mesoscopic Physics
  • Browse content in Psychology
  • Affective Sciences
  • Clinical Psychology
  • Cognitive Psychology
  • Cognitive Neuroscience
  • Criminal and Forensic Psychology
  • Developmental Psychology
  • Educational Psychology
  • Evolutionary Psychology
  • Health Psychology
  • History and Systems in Psychology
  • Music Psychology
  • Neuropsychology
  • Organizational Psychology
  • Psychological Assessment and Testing
  • Psychology of Human-Technology Interaction
  • Psychology Professional Development and Training
  • Research Methods in Psychology
  • Social Psychology
  • Browse content in Social Sciences
  • Browse content in Anthropology
  • Anthropology of Religion
  • Human Evolution
  • Medical Anthropology
  • Physical Anthropology
  • Regional Anthropology
  • Social and Cultural Anthropology
  • Theory and Practice of Anthropology
  • Browse content in Business and Management
  • Business Strategy
  • Business Ethics
  • Business History
  • Business and Government
  • Business and Technology
  • Business and the Environment
  • Comparative Management
  • Corporate Governance
  • Corporate Social Responsibility
  • Entrepreneurship
  • Health Management
  • Human Resource Management
  • Industrial and Employment Relations
  • Industry Studies
  • Information and Communication Technologies
  • International Business
  • Knowledge Management
  • Management and Management Techniques
  • Operations Management
  • Organizational Theory and Behaviour
  • Pensions and Pension Management
  • Public and Nonprofit Management
  • Strategic Management
  • Supply Chain Management
  • Browse content in Criminology and Criminal Justice
  • Criminal Justice
  • Criminology
  • Forms of Crime
  • International and Comparative Criminology
  • Youth Violence and Juvenile Justice
  • Development Studies
  • Browse content in Economics
  • Agricultural, Environmental, and Natural Resource Economics
  • Asian Economics
  • Behavioural Finance
  • Behavioural Economics and Neuroeconomics
  • Econometrics and Mathematical Economics
  • Economic Systems
  • Economic History
  • Economic Methodology
  • Economic Development and Growth
  • Financial Markets
  • Financial Institutions and Services
  • General Economics and Teaching
  • Health, Education, and Welfare
  • History of Economic Thought
  • International Economics
  • Labour and Demographic Economics
  • Law and Economics
  • Macroeconomics and Monetary Economics
  • Microeconomics
  • Public Economics
  • Urban, Rural, and Regional Economics
  • Welfare Economics
  • Browse content in Education
  • Adult Education and Continuous Learning
  • Care and Counselling of Students
  • Early Childhood and Elementary Education
  • Educational Equipment and Technology
  • Educational Strategies and Policy
  • Higher and Further Education
  • Organization and Management of Education
  • Philosophy and Theory of Education
  • Schools Studies
  • Secondary Education
  • Teaching of a Specific Subject
  • Teaching of Specific Groups and Special Educational Needs
  • Teaching Skills and Techniques
  • Browse content in Environment
  • Applied Ecology (Social Science)
  • Climate Change
  • Conservation of the Environment (Social Science)
  • Environmentalist Thought and Ideology (Social Science)
  • Natural Disasters (Environment)
  • Social Impact of Environmental Issues (Social Science)
  • Browse content in Human Geography
  • Cultural Geography
  • Economic Geography
  • Political Geography
  • Browse content in Interdisciplinary Studies
  • Communication Studies
  • Museums, Libraries, and Information Sciences
  • Browse content in Politics
  • African Politics
  • Asian Politics
  • Chinese Politics
  • Comparative Politics
  • Conflict Politics
  • Elections and Electoral Studies
  • Environmental Politics
  • Ethnic Politics
  • European Union
  • Foreign Policy
  • Gender and Politics
  • Human Rights and Politics
  • Indian Politics
  • International Relations
  • International Organization (Politics)
  • International Political Economy
  • Irish Politics
  • Latin American Politics
  • Middle Eastern Politics
  • Political Methodology
  • Political Communication
  • Political Philosophy
  • Political Sociology
  • Political Behaviour
  • Political Economy
  • Political Institutions
  • Political Theory
  • Politics and Law
  • Politics of Development
  • Public Administration
  • Public Policy
  • Quantitative Political Methodology
  • Regional Political Studies
  • Russian Politics
  • Security Studies
  • State and Local Government
  • UK Politics
  • US Politics
  • Browse content in Regional and Area Studies
  • African Studies
  • Asian Studies
  • East Asian Studies
  • Japanese Studies
  • Latin American Studies
  • Middle Eastern Studies
  • Native American Studies
  • Scottish Studies
  • Browse content in Research and Information
  • Research Methods
  • Browse content in Social Work
  • Addictions and Substance Misuse
  • Adoption and Fostering
  • Care of the Elderly
  • Child and Adolescent Social Work
  • Couple and Family Social Work
  • Direct Practice and Clinical Social Work
  • Emergency Services
  • Human Behaviour and the Social Environment
  • International and Global Issues in Social Work
  • Mental and Behavioural Health
  • Social Justice and Human Rights
  • Social Policy and Advocacy
  • Social Work and Crime and Justice
  • Social Work Macro Practice
  • Social Work Practice Settings
  • Social Work Research and Evidence-based Practice
  • Welfare and Benefit Systems
  • Browse content in Sociology
  • Childhood Studies
  • Community Development
  • Comparative and Historical Sociology
  • Economic Sociology
  • Gender and Sexuality
  • Gerontology and Ageing
  • Health, Illness, and Medicine
  • Marriage and the Family
  • Migration Studies
  • Occupations, Professions, and Work
  • Organizations
  • Population and Demography
  • Race and Ethnicity
  • Social Theory
  • Social Movements and Social Change
  • Social Research and Statistics
  • Social Stratification, Inequality, and Mobility
  • Sociology of Religion
  • Sociology of Education
  • Sport and Leisure
  • Urban and Rural Studies
  • Browse content in Warfare and Defence
  • Defence Strategy, Planning, and Research
  • Land Forces and Warfare
  • Military Administration
  • Military Life and Institutions
  • Naval Forces and Warfare
  • Other Warfare and Defence Issues
  • Peace Studies and Conflict Resolution
  • Weapons and Equipment

Organized Crime: A Very Short Introduction

Organized Crime: A Very Short Introduction

Author webpage

  • Cite Icon Cite
  • Permissions Icon Permissions

Organized Crime: A Very Short introduction examines the people involved in organized crime and questions whether the term ‘organized’ is used to evoke the image, operations, and power of a legitimate organization, such as a corporation. Are there particular crimes where the label ‘organized crime’ fits, or can any crime be ‘organized’? What happens when organized crime extends beyond borders? Using examples from across the globe, it analyses different cultural traditions of organized crime, such as the Mafia, Yakuza, and Triads, and the nature of organized crime, from arms trafficking and drug dealing to extortion. Finally, it explores the methods and agencies in place to control and prevent organized crime.

Signed in as

Institutional accounts.

  • Google Scholar Indexing
  • GoogleCrawler [DO NOT DELETE]

Personal account

  • Sign in with email/username & password
  • Get email alerts
  • Save searches
  • Purchase content
  • Activate your purchase/trial code
  • Add your ORCID iD

Institutional access

Sign in with a library card.

  • Sign in with username/password
  • Recommend to your librarian
  • Institutional account management
  • Get help with access

Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:

IP based access

Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.

Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.

  • Click Sign in through your institution.
  • Select your institution from the list provided, which will take you to your institution's website to sign in.
  • When on the institution site, please use the credentials provided by your institution. Do not use an Oxford Academic personal account.
  • Following successful sign in, you will be returned to Oxford Academic.

If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.

Enter your library card number to sign in. If you cannot sign in, please contact your librarian.

Society Members

Society member access to a journal is achieved in one of the following ways:

Sign in through society site

Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:

  • Click Sign in through society site.
  • When on the society site, please use the credentials provided by that society. Do not use an Oxford Academic personal account.

If you do not have a society account or have forgotten your username or password, please contact your society.

Sign in using a personal account

Some societies use Oxford Academic personal accounts to provide access to their members. See below.

A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.

Some societies use Oxford Academic personal accounts to provide access to their members.

Viewing your signed in accounts

Click the account icon in the top right to:

  • View your signed in personal account and access account management features.
  • View the institutional accounts that are providing access.

Signed in but can't access content

Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.

For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.

Our books are available by subscription or purchase to libraries and institutions.

External resource

  • In the OUP print catalogue
  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Rights and permissions
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Home — Essay Samples — Law, Crime & Punishment — Crime — Organized Crime

one px

Essays on Organized Crime

Al capone the most famous gangster, al capone joining the bootlegging industry, made-to-order essay as fast as you need it.

Each essay is customized to cater to your unique preferences

+ experts online

Amado Carrillo: Research Papers

How organized crimes impact the society economically and socially, a study of the impact of america's organized crimes in the 1920s, history of organized crime in the united states, let us write you an essay from scratch.

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

White Collar Crime and Its Effect on Society

The negative counterculture of the italian camorra, serial killers: born evil or the result of upbringing, recognizing, avoiding, and reporting frauds in business world, get a personalized essay in under 3 hours.

Expert-written essays crafted with your exact needs in mind

How Prohibition LED to a Rise in Organised Crime and Corruption

The link between terrorism and drug trafficking, understanding crime: types and impact on society, analysis of the rape case: brzonkala v. virginia polytechnic inst. and state university, the criminal justice system in the uk, the ways to reduce crime in contemporary canadian society, what do we know about money laundering, shared views of metro cebu crime busters' technology, theories of kidnapping, the particular factors that motivate preparers of financial statements to engage in accounting fraud, and safeguards available in preventing accounting fraud, human trafficking: a worldwide problem, misdemeanor and organized crime in us, the concept of accounting fraud and the case study of worldcom, arrest of persons in india, transnational organized crime in southeast asia region: impact towards malaysian security, socio-political and economic welfare, how crime and laws go hand in hand, factors that provoke people to commit crimes, the issue of drug trafficking on a global scale, the role of bans and economic crisis in the 1920s in the growth of organic crimes, the florentino crime family, relevant topics.

  • School Shooting
  • Drunk Driving
  • Serial Killer
  • Domestic Violence
  • Child Abuse
  • Distracted Driving
  • Jeffrey Dahmer
  • Criminals in Society

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

essay on organised crime

Home / Essay Samples / Crime / Organized Crime

Organized Crime Essay Examples

The taliban and its impact on afghanistan.

The Taliban is an insurgency group currently active in Afghanistan. As far as we know, they have been active since 2001 to the present. The word Taliban comes from the word “Talib” meaning “student” or “religious student”. Their main language spoken is Pashto, one of...

A Counter-insurgency Strategy of USA to Defeat Taliban

The terrorist attacks on September 11, 2001 on the World Trade Centre towers and the Pentagon shook the world from the heart of New York. The unprecedented lethality caused and the coordination of events on that day gave a new meaning to terrorism. Yet, it...

Psychological and Social Aspects of Becoming a Serial Killer

They live among everyone and many times no one knows it. Possibly someone’s neighbor, co-worker, or a friend. But all too often when a serial killer is finally discovered people hear the words, “I would have never guessed, he was such a nice guy. ”...

The Negotiations Between the United States and Taliban

Terrorism in Afghanistan has been long understood as a result of foreign occupation of the land by the foreign troops. It has been a direct, or indirect, result of United States military intervention in the country, termed as ‘Graveyard of Empires.’ More recently, the United...

How One Becomes a Serial Killer

Ted Bundy, Jeffrey Dahmer, David Berkowitz, Rose West, and Andrei Chikatilo. These are all names of famous serial killers but what made them that way? Are serial killers genetically born will the urges to take away another human beings life or does the environment they...

Crimes and Gangsters of the 1930s: Al Capone

Gangsters and crimes of the 1930s had a great impact then on the years to come. Crimes during that time consisted of many robberies, assaults, and much more. Gangsters and criminals committed a variety of illegal activities that occurred at a lot of locations. These...

The Connection Between Early Childhood Education and Crime

This article presents new evidence on the crime-reducing impacts of a high-quality, intensive early childhood program with long-term follow-up, evaluated by a randomized controlled trial. Proportionately, more women than men decrease their criminal activity after participating in the program. This gender difference arises because of...

Definition of Crime and Deviance

According to the Oxford Dictionary, ‘crime’ is defined as “an action that is against the law” or “illegal actions as a whole”. (Lexico 2019) This definition could be argued as too simplistic as it does not apply to all criminal offenses. In 1884, the criminal...

The Heroin-related Crime

The relationship between drug use, especially heroin, and criminal behavior has been the subject of continuing debate among social and behavioral scientists, politicians, sociologists, law-enforcement officials, and citizens in Canada. It is true that there is a growing interest in possible correlations and consequences of...

Organized Crime During the Prohibition Era in America

In 1919, the United States passed the 18th amendment, which banned the transportation and manufacture of alcohol in the United States starting in January of 1920. Alcohol was a problem of Americans because people often became alcoholics, resulting in broken families, lone children, and lots...

Trying to find an excellent essay sample but no results?

Don’t waste your time and get a professional writer to help!

You may also like

  • Juvenile Delinquency
  • Broken Windows Theory
  • Juvenile Justice System
  • Charles Manson
  • Forensic Science Essays
  • Hate Crime Essays
  • Cyber Crimes Essays
  • Prostitution Essays
  • Stealing Essays
  • Criminal Procedure Essays
  • Criminal Profiling Essays
  • Somali Piracy Essays
  • Criminals in Society Essays
  • Identity Theft Essays

samplius.com uses cookies to offer you the best service possible.By continuing we’ll assume you board with our cookie policy .--> -->