SOC 328: Trafficking and Financial Crime
Jessica Elizabeth Pulis
Estimated study time: 1 hr 23 min
Table of contents
Sources and References
This document draws primarily on Snider, L. (2015), Corporate Crime, Halifax: Fernwood Publishing, as the principal textbook. Additional readings integrated throughout include: Hubschle, A. (2011), on the financial dimensions of transnational organized crime; Tombs, S. (2012), on state-corporate crime and regulation; Bradshaw, E. (2015), on environmental crime and corporate violence; Baird, M. & Burcher, M. (2020), on criminal exploitation of tax havens; Ghazi-Tehrani, A. K. et al. (2015), on typologies of fraud; Cross, C. et al. (2018), on online fraud victimization; Nash, R. et al. (2017), on fraud detection and prevention; Amendolara, L. (2005), on counterfeiting and intellectual property crime; Chappell, D. et al. (2009), on counterfeiting networks and enforcement; Calderoni, F. (2012), on the structure of drug trafficking organizations; Chalk, P. (2000), on the nexus between drug trafficking and security; Shelley, L. & Albanese, J. (2012), on transnational drug markets; Patterson, O. & Zhuo, X. (2018), on sex trafficking patterns; Weitzer, R. (2011), on the social construction of sex trafficking; Ganji, S. K. (2016), on irregular migration and smuggling; Hubschle, A. (2017), on the political economy of migration and trafficking; Huey, L. & Ferguson, L. (2022), on policing cybercrime; Savage, M. (2024), on emerging cyber threats; Markovska, A. & Adams, N. (2015), on money laundering and post-Soviet corruption; Shelley, L. & Melzer, S. (2008), on the convergence of terrorism and organized crime finance; Paternoster, R. (2016), on deterrence theory and corporate offending; and Schell-Busey, N. et al. (2016), on meta-analyses of corporate crime deterrence. Supplementary theoretical works consulted include Sutherland, E. H. (1949), White Collar Crime; Clinard, M. B. & Quinney, R. (1973), Criminal Behavior Systems; Kramer, R. C. & Michalowski, R. J. (2006), on state-corporate crime; South, N. & Brisman, A. (2013), Routledge International Handbook of Green Criminology; Braithwaite, J. (1989), on regulatory capitalism and responsive regulation; Braithwaite, J. (2002), Restorative Justice and Responsive Regulation; Passas, N. (2000), on criminogenic asymmetries and global anomie; Barak, G. (2012), on crimes of the powerful; Friedrichs, D. O. (2010), Trusted Criminals: White Collar Crime in Contemporary Society; Chambliss, W. J. (1989), on state-organized crime; and Transparency International, Corruption Perceptions Index (annual).
Chapter 1: The Conceptual Foundations of Financial Crime
Defining Financial Crime in Sociological Context
The study of financial crime (金融犯罪) occupies a distinctive and contested position within criminology. Unlike conventional street crime, which tends to attract immediate public outrage and aggressive policing, financial crime unfolds within the institutional architecture of capitalism itself. It is perpetrated by individuals and organizations occupying positions of trust, respectability, and structural power. The sociological analysis of financial crime thus requires more than cataloguing illegal acts; it demands an interrogation of the political-economic systems that produce, enable, and sometimes reward such conduct.
Edwin Sutherland’s foundational concept of white-collar crime (白领犯罪) remains the indispensable starting point for any serious engagement with financial crime. In his 1949 monograph, Sutherland challenged the prevailing assumption that criminality was a product of poverty, psychopathology, or social disorganization. He demonstrated that persons of high social status and respectability committed crimes in the course of their occupations with regularity and impunity. Sutherland’s intervention was not merely empirical but profoundly theoretical: it revealed that the very definition of crime was shaped by the class position of those who made and enforced the law. Sutherland’s study of seventy major corporations showed that every one of them had been sanctioned for law violations, yet none of their executives had been treated as criminals by the justice system. This finding exposed the deep class bias embedded in criminological theory and criminal justice practice alike, and it established a research agenda that continues to animate the field.
Sutherland’s definition of white-collar crime – “a crime committed by a person of respectability and high social status in the course of his occupation” – has been extensively debated. Some scholars have argued that the definition is too broad, conflating the social status of the offender with the nature of the offense. Others contend that it is too narrow, excluding crimes committed by lower-status employees or by organizations as collective entities. Despite these debates, the core insight remains: the study of crime cannot be restricted to the poor and marginalized without producing a fundamentally distorted picture of the distribution and consequences of criminal conduct.
Clinard and Quinney’s Typology: Corporate vs. Occupational Crime
Clinard and Quinney (1973) advanced the analysis by introducing a crucial distinction between corporate crime (企业犯罪) and occupational crime (职业犯罪). Corporate crime refers to offenses committed by officers and employees of a corporation on behalf of the corporation itself – that is, conduct undertaken to advance the interests of the organization rather than the personal interests of the individual offender. Occupational crime, by contrast, refers to offenses committed by individuals in the course of their occupations primarily for personal benefit, potentially against the interests of their employers.
Clinard and Quinney further subdivided occupational crime into offenses by professionals (physicians, lawyers, pharmacists), employees (embezzlement, pilferage), and individuals operating outside organizational settings (tax evasion by self-employed persons). This typological framework sharpened the analytical tools available to researchers and directed attention to the different mechanisms of control appropriate to each category. Corporate crime, deeply embedded in organizational structure and culture, is resistant to strategies that focus on individual deterrence; it requires organizational-level interventions including structural reform, enhanced oversight, and the imposition of liability on corporate officers.
State-Corporate Crime: Kramer and Michalowski
Kramer and Michalowski (2006) introduced the concept of state-corporate crime (国家-企业犯罪), which refers to illegal or harmful actions that result from the intersection of state and corporate interests. In their formulation, state-corporate crime occurs when one or both of two conditions are met: either the state directly participates in corporate wrongdoing (state-initiated corporate crime), or the state fails to regulate corporate conduct despite knowing that such failure will result in harm (state-facilitated corporate crime).
This concept is analytically powerful because it moves beyond the conventional assumption that the state stands in an adversarial relationship to corporate crime as its regulator and prosecutor. In reality, as Kramer and Michalowski demonstrate, the state is frequently complicit in corporate wrongdoing – whether through active participation, regulatory forbearance, or the construction of legal frameworks that shield corporate actors from accountability. The 2003 space shuttle Columbia disaster, for instance, exemplified state-facilitated corporate crime: NASA administrators, under political and budgetary pressure, overrode safety concerns raised by engineers, leading directly to the deaths of seven astronauts.
Snider (2015) extends this analysis by situating corporate crime within the structural dynamics of contemporary capitalism. For Snider, the corporation is not an aberrant actor within an otherwise legitimate economic order; rather, the corporation is the dominant organizational form of capitalism, and its structural imperatives toward profit maximization generate systematic pressures to externalize costs, evade regulation, and violate the law when doing so is profitable. Corporate crime, in this view, is not a matter of a few bad apples but a predictable outcome of institutional design.
The Invisible Harms of Corporate and Financial Crime
One of the central paradoxes of financial crime is the disjunction between its scale and its visibility. As Tombs (2012) argues, the harms produced by corporate and state-corporate crime vastly exceed those of conventional crime in virtually every measurable dimension: economic loss, physical injury, environmental degradation, and loss of life. Yet these harms remain largely invisible within the dominant frameworks of criminal justice. Tombs identifies several mechanisms through which this invisibility is produced and maintained.
First, there is the question of legal categorization. Many of the most harmful corporate practices are not classified as crimes at all but as regulatory violations, civil infractions, or administrative matters. This taxonomic distinction has enormous consequences: it determines whether police or regulatory agencies investigate, whether prosecution or negotiation follows, and whether punishment takes the form of imprisonment or a fine that can be treated as a cost of doing business.
Second, the diffusion of responsibility within complex organizations makes it difficult to assign individual culpability. The corporate form itself provides a veil behind which decision-makers can shelter. When a chemical plant explodes or a pharmaceutical product kills, the causal chain is long, the decisions distributed across multiple levels of the organizational hierarchy, and the paper trail carefully managed.
Third, as Passas (2000) has argued, the global architecture of finance creates what he terms criminogenic asymmetries (致罪性不对称) – structural disjunctions between different regulatory jurisdictions, economic systems, and legal traditions that generate opportunities for exploitation. Transnational corporations operate across borders with a facility that regulators and law enforcement agencies cannot match.
Theoretical Frameworks for Analyzing Financial Crime
Structural and Political-Economic Approaches
Snider (2015) situates her analysis within a political-economic framework that draws on Marxist and critical criminological traditions. From this perspective, the state is not a neutral arbiter between competing interests but a terrain of struggle shaped by the structural power of capital. Regulation is always a compromise, and in periods of capitalist crisis or neoliberal restructuring, the balance of power shifts decisively in favor of corporate interests. Deregulation, privatization, and the hollowing-out of enforcement capacity are not policy mistakes but logical outcomes of the structural relationship between state and capital.
Barak (2012) advances a complementary analysis of what he terms crimes of the powerful, arguing that the most consequential forms of criminal conduct are those committed by states, corporations, and financial institutions. These crimes are sustained by ideological legitimation, institutional complicity, and the systematic neutralization of accountability mechanisms.
Differential Association and Cultural Explanations
Sutherland’s theory of differential association (差异交往理论) proposes that criminal behavior, including white-collar crime, is learned through interaction with others who define law violation favorably. Within corporate settings, this process operates through the organizational culture: new employees are socialized into norms that tolerate or encourage cutting corners, manipulating accounts, or deceiving regulators. The culture of the organization, not the psychology of the individual, is the primary unit of analysis.
Rational Choice and Deterrence Perspectives
Paternoster (2016) has provided a sophisticated treatment of deterrence theory as applied to corporate crime, arguing that the effectiveness of deterrence depends not merely on the formal severity of sanctions but on the perceived certainty and celerity of punishment. Crucially, deterrence operates through perceptual mechanisms: what matters is not the objective probability of punishment but the subjective assessment of risk by potential offenders. In the corporate context, where enforcement is sporadic and sanctions are often negotiated, the deterrent effect of law is systematically undermined.
Hubschle and the Transnational Dimension
Hubschle (2011) contributes an important analysis of the transnational dimensions of financial crime, emphasizing the ways in which organized criminal networks exploit the interstices of the global financial system. Her work highlights the inadequacy of nationally bounded regulatory frameworks in addressing crimes that are inherently transnational in scope. The financial dimensions of organized crime – including drug trafficking, wildlife trafficking, and arms dealing – depend on the same infrastructure of banks, shell companies, and offshore financial centers that serves legitimate global commerce.
Chapter 2: Environmental Crime and Tax Havens
The Political Economy of Environmental Crime
Environmental crime (环境犯罪) represents one of the most consequential yet under-studied categories of financial crime. It encompasses a vast range of conduct: illegal dumping of hazardous waste, unlicensed emissions of pollutants, trafficking in endangered species and protected resources, illegal logging and mining, and the systematic violation of environmental regulations by corporations whose profit margins depend on externalizing the costs of production onto ecosystems and communities.
Snider (2015, Chapter 2) provides a structural analysis of environmental crime that rejects individualistic explanations in favor of a political-economic framework. Environmental harms, she argues, are not the product of rogue operators or ignorant polluters but are systematically generated by the profit imperatives of capitalist production. The externalization of environmental costs is not an aberration but a constitutive feature of the capitalist mode of production. When corporations are permitted – or encouraged through weak regulation – to treat the natural environment as a free input and a cost-free waste repository, environmental destruction follows as a matter of course.
Green Criminology: South and Brisman
South and Brisman (2013) have advanced the theoretical framework of green criminology (绿色犯罪学), which extends the boundaries of criminological analysis beyond legally defined offenses to encompass the full range of environmental harms, including those that are legal but ecologically destructive. Green criminology draws on ecological justice, environmental sociology, and political ecology to argue that criminology must address harms to ecosystems, nonhuman species, and future generations – harms that conventional criminal law systematically ignores.
Green criminology identifies several categories of environmental harm that warrant criminological attention. These include primary green crimes – acts that directly result in environmental destruction, such as deforestation, pollution, and species extinction – and secondary green crimes – the regulatory and enforcement failures that permit primary harms to occur. South and Brisman further identify symbiotic green crimes, in which environmental destruction is intertwined with other forms of criminal enterprise, such as the use of illegal logging operations to launder drug trafficking proceeds.
The explosion of the Deepwater Horizon oil rig in the Gulf of Mexico killed eleven workers and released approximately 4.9 million barrels of crude oil into the marine environment. Subsequent investigations revealed that BP had systematically cut corners on safety in pursuit of cost savings, overriding the concerns of its own engineers. The disaster was not an accident in any meaningful sense but the predictable consequence of an organizational culture in which profit took precedence over safety and environmental protection. Despite the scale of harm, criminal prosecutions were limited and the financial penalties, while nominally large, represented a fraction of BP's annual revenues.
The Union Carbide gas leak in Bhopal, India, killed at least 3,787 people immediately and caused lasting health damage to over 500,000 residents. The plant had been operating with known safety deficiencies, and cost-cutting measures had led to the deactivation of critical safety systems. The legal aftermath illustrated the structural impunity enjoyed by transnational corporations: Union Carbide settled civil claims for $470 million -- a fraction of the harm inflicted -- and the criminal case against its CEO Warren Anderson, who fled India and never faced trial, was eventually closed. Bhopal remains the paradigmatic case of corporate environmental violence in the Global South.
The Grassy Narrows First Nation in northwestern Ontario has suffered decades of mercury contamination resulting from the dumping of industrial waste by a Dryden, Ontario, paper mill in the 1960s and 1970s. The mercury poisoned the English-Wabigoon River system, contaminating the fish that constituted the primary food source and economic livelihood of the Asubpeeschoseewagong (Grassy Narrows) and Wabaseemoong (White Dog) First Nations. Neurological damage, intergenerational health effects, and the destruction of the communities' economic base followed. Decades of government inaction and corporate denial exemplify the intersection of environmental crime, colonial dispossession, and state-corporate complicity that green criminology seeks to analyze. Only in 2020 did the Canadian federal government commit to building a mercury care home in the community.
Bradshaw and Corporate Environmental Violence
Bradshaw (2015) advances the concept of corporate environmental violence to capture the systematic, ongoing, and often lethal character of corporate environmental harm. The language of violence, Bradshaw argues, is appropriate because the harms inflicted are not accidental but are foreseeable consequences of deliberate decisions to prioritize profit over safety and environmental protection. Corporate environmental violence includes not only spectacular disasters but also the slow, cumulative violence of chronic pollution exposure, contaminated water supplies, and degraded ecosystems that disproportionately affect marginalized communities.
Bradshaw’s framework challenges the conventional distinction between criminal violence and regulatory violation by insisting that the physical and ecological harms produced by corporate environmental conduct are substantively indistinguishable from the harms recognized by criminal law. The fact that they are processed through regulatory rather than criminal channels reflects the political power of corporate actors, not the objective character of the harm.
Wildlife Trafficking, Illegal Logging, and E-Waste
Wildlife trafficking (野生动物贩运) constitutes a major dimension of environmental crime, estimated by the United Nations at $7 to $23 billion annually. It encompasses the illegal trade in live animals, animal parts (ivory, rhino horn, pangolin scales), and plant products. Wildlife trafficking threatens biodiversity, drives species toward extinction, and is increasingly linked to transnational organized crime networks that also engage in drug trafficking and arms dealing. The illegal ivory trade, for instance, has been linked to the financing of armed groups in Central and East Africa.
Illegal logging (非法伐木) accounts for between 15 and 30 percent of the global timber trade and is a major driver of deforestation, particularly in the Amazon basin, Southeast Asia, and the Congo. Illegal logging operations often operate with the complicity of corrupt officials and are intertwined with land-grabbing, the displacement of Indigenous peoples, and the laundering of proceeds through legitimate timber supply chains.
The transnational dumping of e-waste (电子废弃物) – discarded electronics containing toxic materials such as lead, mercury, and cadmium – represents a growing form of environmental crime. Despite the Basel Convention’s restrictions on the transboundary movement of hazardous waste, millions of tons of e-waste are exported annually from wealthy countries to developing nations, particularly in West Africa and South Asia, where informal recycling operations expose workers and communities to severe health hazards. The e-waste trade illustrates the global inequality at the heart of environmental crime: the benefits of electronic consumption accrue to affluent societies, while the toxic costs are externalized onto the poorest communities.
Tax Havens and Offshore Finance
The Architecture of Tax Evasion
Tax havens (避税天堂), or offshore financial centers (离岸金融中心), constitute a critical infrastructure of global financial crime. These jurisdictions offer low or zero tax rates, strict banking secrecy, minimal regulatory oversight, and legal frameworks designed to facilitate the creation of shell companies, trusts, and other opaque financial vehicles. The scale of the offshore economy is staggering: estimates suggest that between $21 trillion and $32 trillion in private financial wealth is held offshore, beyond the reach of national tax authorities.
Baird and Burcher (2020) provide a detailed analysis of how criminal organizations exploit the architecture of offshore finance. Their research demonstrates that the same mechanisms used by multinational corporations and wealthy individuals for legal tax planning are employed by drug traffickers, arms dealers, and corrupt officials to launder criminal proceeds and evade law enforcement. The convergence of legal and illegal financial flows within the offshore system makes detection and enforcement extraordinarily difficult.
The Panama Papers, Paradise Papers, and Pandora Papers
The massive document leaks of the 2010s and 2020s revealed the scale and scope of offshore wealth concealment with unprecedented specificity. The Panama Papers (巴拿马文件, 2016) – 11.5 million documents leaked from the Panamanian law firm Mossack Fonseca – exposed the offshore holdings of world leaders, celebrities, and criminal networks. The leak revealed that Mossack Fonseca had created over 214,000 shell companies in jurisdictions around the world, many of which were used to conceal assets, evade taxes, and launder money.
The Paradise Papers (天堂文件, 2017) – 13.4 million documents from the offshore law firm Appleby and associated corporate registries – revealed the offshore financial dealings of multinational corporations, political figures, and wealthy individuals. Among the most significant revelations were the elaborate tax avoidance structures used by companies like Apple, Nike, and Glencore, as well as the offshore investments of individuals connected to the inner circles of governments from the United States to Russia.
The Pandora Papers (潘多拉文件, 2021) – the largest leak to date, comprising nearly 12 million documents from 14 offshore service providers – revealed the hidden wealth of over 330 politicians and public officials from more than 90 countries. The Pandora Papers demonstrated that the offshore industry had not been significantly reformed despite the earlier leaks, and that the political class responsible for enacting anti-tax-evasion legislation was itself deeply embedded in the offshore system.
The OECD BEPS Framework
The Organisation for Economic Co-operation and Development’s Base Erosion and Profit Shifting (BEPS; 税基侵蚀和利润转移) initiative represents the most significant multilateral effort to address the exploitation of gaps and mismatches in international tax rules by multinational enterprises. Launched in 2013, the BEPS framework comprises fifteen action items addressing issues such as transfer pricing, treaty abuse, and country-by-country reporting. While the BEPS framework has produced some reforms – notably the 2021 agreement among over 130 countries to implement a global minimum corporate tax rate of 15 percent – critics argue that its impact has been limited by the voluntary nature of implementation, the influence of corporate lobbying on the design of rules, and the exclusion of developing countries from key decision-making processes.
Canadian Connections: The Offshore Tax Gap
Canada has significant connections to the offshore financial system. The Canada Revenue Agency (CRA) has estimated the offshore tax gap – the difference between taxes owed and taxes collected on income sheltered offshore – at between $0.8 billion and $3 billion annually, though independent analyses suggest the true figure may be considerably higher. Canadian banks maintain extensive operations in offshore jurisdictions, and Canadian corporate structures – particularly the use of numbered companies and trusts – facilitate the movement of funds to and from tax havens.
The Political Economy of Tax Havens
The persistence of tax havens is not a failure of international cooperation but a reflection of the structural incentives operating within the global financial system. Small jurisdictions benefit economically from providing offshore services, while major financial centers – including London, New York, and Zurich – profit enormously from the intermediary services they provide to offshore wealth. As Snider (2015) argues, the political power of the financial sector has been sufficient to block meaningful reform, despite periodic scandals such as the Panama Papers and the Paradise Papers that reveal the scale of offshore wealth concealment.
Baird and Burcher on Criminal Exploitation of Offshore Finance
Baird and Burcher (2020) identify several mechanisms through which organized criminal networks exploit offshore financial infrastructure. These include the creation of layered shell company structures that obscure beneficial ownership, the use of trade-based money laundering to move value across borders under the cover of legitimate commerce, and the exploitation of jurisdictional arbitrage – the practice of routing transactions through multiple jurisdictions to exploit gaps in regulatory coverage. Their analysis underscores the point that financial crime is not a separate domain from legitimate finance but is deeply embedded within it.
Chapter 3: Fraud
The Nature and Typology of Fraud
Fraud (欺诈) is perhaps the most protean of financial crimes, encompassing an enormous range of deceptive practices united by a common logic: the deliberate misrepresentation of material facts to induce a victim to part with money, property, or rights. Fraud can be committed by individuals or organizations, against individuals or institutions, and through mechanisms ranging from face-to-face deception to sophisticated digital schemes operating at global scale.
Ghazi-Tehrani et al. and Fraud Typologies
Ghazi-Tehrani et al. (2015) provide a systematic typology of fraud that moves beyond simple categorization to examine the structural conditions that facilitate different forms of fraudulent conduct. Their analysis distinguishes between occupational fraud (committed by employees against their employers), organizational fraud (committed by organizations against external parties such as consumers, investors, or the state), and individual fraud (committed by persons acting outside an organizational context). This typological framework is analytically valuable because it directs attention to the different opportunity structures, motivational dynamics, and regulatory contexts associated with each form.
Organizational fraud, Ghazi-Tehrani et al. argue, is particularly consequential because it mobilizes the resources and legitimacy of formal organizations in the service of deception. When a corporation commits securities fraud by inflating its earnings, or an insurance company systematically underpays claims, the organizational form provides both the means of deception and the shield against accountability. The victims of organizational fraud are often dispersed and unaware that they have been victimized, which further reduces the probability of detection and prosecution.
Ponzi Schemes and Securities Fraud
The Ponzi scheme (庞氏骗局) represents one of the most enduring and destructive forms of fraud. Named after Charles Ponzi, who defrauded investors in 1920 by promising returns from an arbitrage scheme involving international reply coupons, the Ponzi scheme operates by using funds from new investors to pay returns to earlier investors, creating the illusion of a profitable enterprise. The scheme collapses when inflows of new capital can no longer sustain the promised returns.
Bernard Madoff operated the largest Ponzi scheme in history, defrauding investors of approximately $65 billion over several decades. Madoff's scheme exploited his position as a respected Wall Street figure and former chairman of the NASDAQ stock exchange to attract wealthy individuals, charitable foundations, hedge funds, and institutional investors. The fraud was sustained not only by Madoff's personal credibility but by the failure of the Securities and Exchange Commission (SEC) to investigate credible warnings, most notably those of whistleblower Harry Markopolos, who had identified the fraud years before its collapse. Madoff's case illustrates the role of social capital, institutional trust, and regulatory failure in enabling large-scale fraud.
In the Canadian context, Earl Jones operated a Ponzi scheme from Montreal that defrauded approximately 150 investors -- many of them elderly retirees and members of his own extended family -- of over $50 million. Jones, who was not a registered financial advisor, exploited personal trust relationships within tight-knit communities to attract victims. His 2010 conviction and eleven-year prison sentence drew attention to the inadequacy of Canadian securities regulation, which is provincially administered and fragmented across thirteen jurisdictions, creating gaps that unscrupulous operators can exploit.
Securities Fraud: Enron and WorldCom
Securities fraud (证券欺诈) involves the misrepresentation of information used by investors to make decisions, including the manipulation of financial statements, insider trading, and market manipulation. The early 2000s wave of corporate accounting scandals revealed the depth of securities fraud within some of America’s largest corporations.
Enron, once the seventh-largest company in the United States by revenue, collapsed in 2001 after it was revealed that the corporation had used special-purpose entities and fraudulent accounting practices to conceal billions of dollars in debt and inflate earnings. The fraud was facilitated by the complicity of Enron’s external auditor, Arthur Andersen, and the failure of financial analysts, credit rating agencies, and regulators to identify the deception. WorldCom’s $11 billion accounting fraud, revealed in 2002, involved the systematic capitalization of operating expenses to inflate reported earnings. Both cases led to the passage of the Sarbanes-Oxley Act (2002), which imposed new requirements for corporate governance, internal controls, and auditor independence.
The SNC-Lavalin Affair
The SNC-Lavalin affair (SNC-兰万灵事件) illustrates the intersection of corporate fraud, corruption, and political power in the Canadian context. SNC-Lavalin, one of Canada’s largest engineering and construction firms, was charged in 2015 with fraud and corruption related to payments of approximately $48 million to Libyan government officials under the Gaddafi regime. The affair became a political crisis in 2019 when it was revealed that officials in Prime Minister Justin Trudeau’s office had pressured Attorney General Jody Wilson-Raybould to intervene in the prosecution and offer the company a deferred prosecution agreement (延期起诉协议) – a remediation agreement that would have allowed SNC-Lavalin to avoid a criminal conviction. The affair raised fundamental questions about the relationship between corporate power and political authority in Canada, and about the integrity of prosecutorial independence.
Online Fraud and Digital Victimization
Cross et al. (2018) examine the phenomenon of online fraud (网络欺诈), which has expanded dramatically with the proliferation of digital communication technologies. Their research focuses on the experiences of fraud victims, revealing that online fraud produces not only financial losses but also profound psychological and social harms including shame, self-blame, social isolation, and deterioration of trust. The anonymity and geographic reach of digital communication create an environment in which fraudsters can operate with minimal risk of identification and prosecution.
Cross et al. identify several structural features of the digital environment that facilitate fraud: the ease of identity fabrication, the difficulty of verifying claims made online, the speed of financial transfers, and the jurisdictional fragmentation that impedes law enforcement cooperation. They argue that effective fraud prevention requires not only technological solutions but also a deeper understanding of the social and psychological dynamics of victimization.
Identity Theft and Insurance Fraud
Identity theft (身份盗窃) – the unauthorized use of another person’s personal information for financial gain – has become one of the most prevalent forms of fraud in the digital age. It encompasses the theft of credit card numbers, Social Insurance Numbers, banking credentials, and other personal data, which are then used to open fraudulent accounts, make unauthorized purchases, or file false tax returns. The Canadian Anti-Fraud Centre reported over 40,000 victims of identity fraud in Canada in recent years, with losses exceeding hundreds of millions of dollars annually.
Insurance fraud (保险欺诈) spans a broad range of conduct from individual claimants exaggerating injuries to organized rings staging automobile accidents. The Insurance Bureau of Canada estimates that insurance fraud adds approximately $1.6 billion annually to the premiums paid by Canadian policyholders. Insurance fraud is notable for its social tolerance: surveys consistently find that a significant proportion of the public views minor insurance fraud – padding claims, exaggerating damages – as acceptable behavior, illustrating the normalization of certain forms of financial crime.
Nash et al. on Fraud Detection and Prevention
Nash et al. (2017) examine the institutional landscape of fraud detection and prevention, focusing on the interplay between public regulation, private compliance, and technological surveillance. Their analysis reveals a complex ecosystem in which responsibility for fraud prevention is distributed across multiple actors – regulators, law enforcement agencies, financial institutions, technology companies, and individual consumers – with significant gaps and overlaps in coverage.
Nash et al. argue that the prevailing approach to fraud prevention, which emphasizes individual responsibility and consumer vigilance, is fundamentally inadequate. Fraud is a structural problem that requires structural solutions: robust regulatory frameworks, adequately resourced enforcement agencies, and corporate accountability mechanisms that impose real costs on organizations that facilitate or fail to prevent fraudulent conduct.
Chapter 4: Counterfeiting
The Political Economy of Counterfeiting
Counterfeiting (伪造) – the unauthorized reproduction of goods, currency, documents, or intellectual property – is one of the oldest forms of financial crime and one of the most rapidly growing. The global trade in counterfeit goods is estimated to exceed $500 billion annually, encompassing everything from luxury fashion and consumer electronics to pharmaceuticals, automotive parts, and aircraft components. The consequences extend far beyond economic loss to the holders of intellectual property rights; counterfeit products pose serious risks to public health and safety, while the revenues they generate flow into criminal networks involved in other forms of transnational crime.
Amendolara on Counterfeiting and Intellectual Property Crime
Amendolara (2005) provides an analysis of counterfeiting that situates it within the broader framework of intellectual property crime (知识产权犯罪). Her work traces the evolution of counterfeiting from a relatively small-scale artisanal activity to a massive global industry driven by the same forces of globalization that have transformed legitimate commerce: reduced trade barriers, containerized shipping, digital communication, and the geographic dispersion of manufacturing capacity.
Amendolara emphasizes the role of consumer demand in sustaining the counterfeiting industry. The market for counterfeit goods is not limited to unwitting victims who believe they are purchasing genuine products; a substantial proportion of consumers knowingly purchase counterfeits, attracted by low prices and indifferent to – or unaware of – the broader consequences. This demand-side dynamic complicates enforcement strategies that focus exclusively on supply-side interdiction.
Pharmaceutical Counterfeiting and Health Risks
Pharmaceutical counterfeiting (假药制造) represents the most dangerous dimension of the counterfeiting problem. The World Health Organization estimates that up to 10 percent of medicines worldwide are counterfeit, with the proportion rising to 30 percent or more in parts of sub-Saharan Africa and Southeast Asia. Counterfeit pharmaceuticals may contain no active ingredient, incorrect dosages, the wrong active ingredient, or toxic contaminants. The consequences are lethal: the WHO estimates that substandard and falsified antimalarial drugs alone cause approximately 116,000 deaths annually in sub-Saharan Africa.
Currency Counterfeiting and RCMP Operations
Currency counterfeiting (伪造货币) has a long history in Canada, where the RCMP has maintained dedicated counterfeit enforcement units since the early twentieth century. The introduction of polymer banknotes by the Bank of Canada beginning in 2011 significantly reduced counterfeiting rates – Canadian dollar counterfeiting declined by over 90 percent in the decade following the transition. However, currency counterfeiting remains a global concern, particularly involving the U.S. dollar. The RCMP’s Counterfeit and Document Examination Directorate works in coordination with the Bank of Canada and international partners to detect and disrupt counterfeiting operations.
Digital Piracy and Luxury Goods Counterfeiting
Digital piracy (数字盗版) – the unauthorized copying and distribution of copyrighted digital content including music, film, software, and books – represents a form of counterfeiting that has been profoundly shaped by the digital revolution. While the economic losses from digital piracy are contested (industry estimates are widely regarded as inflated), the phenomenon illustrates how technological change can transform the opportunity structure for intellectual property crime.
The counterfeiting of luxury goods (奢侈品仿冒) – designer handbags, watches, clothing, and accessories – constitutes a multi-billion-dollar global industry with complex supply chains linking manufacturers, often in China and Southeast Asia, to distributors and retailers worldwide. The luxury goods counterfeiting trade is increasingly conducted through online marketplaces and social media platforms, complicating enforcement efforts.
Chappell et al. on Counterfeiting Networks and Enforcement
Chappell et al. (2009) examine the organizational structure of counterfeiting networks and the challenges these structures pose for law enforcement. Their research reveals that counterfeiting operations range from small, opportunistic enterprises to sophisticated transnational networks with hierarchical organization, division of labor, and established distribution channels. The most consequential operations are deeply integrated into legitimate supply chains, using the same ports, shipping routes, and wholesale distribution networks as genuine products.
Chappell et al. identify several key challenges for enforcement. The sheer volume of global trade makes physical inspection of all goods impossible; customs authorities typically inspect fewer than five percent of shipping containers. The production of counterfeits is concentrated in jurisdictions where enforcement is weak or complicit. And the penalties for counterfeiting, where they are imposed at all, are typically far less severe than those for drug trafficking or other forms of organized crime, creating an incentive structure that favors counterfeiting as a lower-risk criminal enterprise.
The digital transformation of commerce has further complicated enforcement. Online marketplaces, social media platforms, and encrypted communication channels provide counterfeiting networks with new mechanisms for marketing, distribution, and customer engagement that are difficult to monitor and disrupt.
Chapter 5: Drug Trafficking
The Global Architecture of Drug Markets
Drug trafficking (毒品贩运) is among the most profitable and politically consequential forms of transnational organized crime. The United Nations Office on Drugs and Crime estimates the global drug trade at between $400 billion and $600 billion annually, making it one of the largest sectors of the global economy. The production, distribution, and consumption of illicit drugs generate enormous flows of money that must be laundered, creating deep interconnections between drug trafficking and the broader infrastructure of financial crime.
Calderoni on the Structure of Drug Trafficking Organizations
Calderoni (2012) provides a rigorous analysis of the organizational structure of drug trafficking organizations (贩毒组织), challenging the popular image of monolithic, hierarchically organized cartels. Drawing on network analysis methodologies, Calderoni demonstrates that drug trafficking organizations exhibit considerable structural diversity, ranging from tightly hierarchical command structures to loose, decentralized networks of semi-autonomous cells connected by flexible relationships of exchange and cooperation.
This structural diversity has important implications for enforcement. Strategies designed to decapitate hierarchical organizations by removing leaders – the so-called kingpin strategy – are likely to be ineffective against network-structured organizations that can adapt to the loss of individual nodes by reconfiguring their connections. Calderoni argues that effective enforcement requires a more sophisticated understanding of organizational structure and the development of strategies tailored to the specific characteristics of the networks being targeted.
The fragmentation of Mexican drug trafficking organizations following the kingpin strategy pursued by both Mexican and U.S. authorities illustrates Calderoni's argument. The arrest or killing of major cartel leaders did not reduce the volume of drug trafficking but instead produced a proliferation of smaller, more violent organizations competing for territory and market share. The organizational form adapted to enforcement pressure, demonstrating the limitations of strategies that target individuals rather than the structural conditions that sustain the trade. Mexican cartels -- including the Sinaloa Cartel and Cartel Jalisco Nueva Generacion (CJNG) -- have diversified into fentanyl production and trafficking, methamphetamine, human smuggling, and extortion, illustrating the convergence of multiple criminal enterprises within single organizational networks.
The Canadian Context: The Fentanyl Crisis and the Opioid Emergency
The Canadian drug trafficking landscape has been transformed by the fentanyl crisis (芬太尼危机), which has produced an unprecedented public health emergency. British Columbia declared a public health emergency in April 2016 in response to the escalating toll of opioid overdose deaths, which have since claimed over 14,000 lives in the province alone. Fentanyl and its analogues – synthetic opioids that are 50 to 100 times more potent than morphine – are now the leading cause of death among adults aged 19 to 39 in British Columbia.
The Port of Vancouver serves as a major entry point for precursor chemicals used in the illicit manufacture of fentanyl, many of which are sourced from chemical manufacturers in China. The compact nature of fentanyl – a lethal dose can be measured in micrograms – makes it exceptionally difficult to detect through conventional border enforcement methods. The supply chain typically involves the importation of precursor chemicals, domestic synthesis in clandestine laboratories, and distribution through networks that range from organized crime groups to street-level dealers operating through social media.
Dark Web Drug Markets
The emergence of dark web markets (暗网市场) has transformed the retail end of drug trafficking. The Silk Road (丝绸之路), launched in 2011 and shut down by the FBI in 2013, pioneered the model of anonymous online drug marketplaces operating on the Tor network and using Bitcoin for payment. Despite the arrest of Silk Road’s founder, Ross Ulbricht, successor platforms proliferated rapidly. Dark web markets have reduced the violence associated with street-level drug dealing by replacing physical transactions with anonymous digital exchanges, but they have also expanded access to a wider range of drugs and created new challenges for law enforcement.
Chalk on Drugs and Security
Chalk (2000) examines the nexus between drug trafficking and broader security concerns, arguing that the drug trade destabilizes states, corrupts institutions, and finances insurgent and terrorist movements. His analysis focuses on the ways in which drug trafficking undermines governance in producer and transit countries, where the enormous revenues generated by the trade give traffickers the capacity to corrupt officials, co-opt security forces, and exercise de facto sovereignty over territory.
Chalk’s analysis is particularly attentive to the relationship between drug trafficking and armed conflict. In contexts ranging from Colombia and Afghanistan to Myanmar and West Africa, drug revenues have financed insurgent movements, prolonged conflicts, and undermined peace processes. The entanglement of drug trafficking with armed conflict creates a vicious cycle in which instability provides the conditions for drug production, and drug revenues perpetuate instability.
Shelley and Albanese on Transnational Drug Markets
Shelley and Albanese (2012) provide a comparative analysis of transnational drug markets, emphasizing the ways in which globalization has transformed the geography and organization of the drug trade. They document the emergence of new trafficking routes, the diversification of drug portfolios by trafficking organizations, and the increasing integration of drug trafficking with other forms of transnational crime including human trafficking, arms trafficking, and money laundering.
Their analysis highlights the role of convergence (犯罪融合) – the tendency of different forms of transnational crime to utilize shared infrastructure, personnel, and methods. Drug trafficking organizations do not operate in isolation but are embedded in broader criminal ecosystems in which the same networks, financial channels, and corrupt officials serve multiple criminal enterprises simultaneously. This convergence poses significant challenges for law enforcement agencies organized along functional lines – drug enforcement, immigration enforcement, financial crime investigation – that struggle to address the interconnected character of contemporary organized crime.
Chapter 6: Sex Trafficking
Defining and Contesting Sex Trafficking
Sex trafficking (性贩运) is among the most politically charged and analytically contested categories within the study of trafficking and financial crime. The United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children (the Palermo Protocol (巴勒莫议定书), 2000) defines human trafficking (人口贩运) as the recruitment, transportation, transfer, harboring, or receipt of persons by means of threat, force, coercion, abduction, fraud, deception, or abuse of power for the purpose of exploitation. Sex trafficking refers specifically to trafficking for the purpose of sexual exploitation.
The Palermo Protocol, adopted as a supplement to the UN Convention against Transnational Organized Crime, established the first internationally agreed-upon definition of human trafficking and obligated signatory states to criminalize trafficking, protect victims, and cooperate in prevention. However, the Protocol has been criticized for its emphasis on criminal prosecution over victim protection, its ambiguity regarding the distinction between trafficking and sex work, and its limited enforcement mechanisms.
Distinguishing Trafficking from Sex Work
One of the most contentious analytical and political issues in this field is the distinction between sex trafficking and sex work (性工作). This distinction has profound implications for law, policy, and the lives of those involved in the sex industry. Broadly, two positions dominate the debate.
The abolitionist or radical feminist position holds that all forms of commercial sexual exchange are inherently exploitative and that the distinction between voluntary sex work and forced trafficking is illusory, because the structural inequalities of gender, race, and class that drive women into the sex industry vitiate any meaningful notion of consent. From this perspective, the appropriate policy response is the criminalization of the purchase of sexual services (the so-called Nordic model) and the provision of exit services for those in the industry.
The sex workers’ rights position holds that consensual adult sex work is legitimate labor that should be decriminalized and regulated, and that the conflation of sex work with trafficking harms sex workers by subjecting them to criminalization, police harassment, and loss of labor protections. From this perspective, trafficking involves force, fraud, or coercion and must be distinguished from voluntary migration for sex work, however constrained by economic circumstances that migration may be.
Patterson and Zhuo on Sex Trafficking Patterns
Patterson and Zhuo (2018) provide an empirically grounded analysis of sex trafficking patterns, examining the demographic characteristics of victims and perpetrators, the mechanisms of recruitment and control, and the institutional contexts in which trafficking occurs. Their research reveals that sex trafficking is not a uniform phenomenon but takes multiple forms depending on the social, economic, and legal context. Domestic trafficking within national borders is at least as prevalent as transnational trafficking, though it receives less public attention.
Patterson and Zhuo emphasize the role of economic vulnerability in creating conditions conducive to trafficking. Poverty, lack of educational and employment opportunities, gender inequality, and family dysfunction all increase the susceptibility of individuals to recruitment by traffickers. At the same time, demand-side factors – the existence of markets for commercial sexual services – create the economic incentive that drives trafficking operations. Their analysis thus insists on the structural character of sex trafficking, rejecting explanations that reduce it to individual pathology or moral failing.
Weitzer and the Social Construction of Sex Trafficking
Weitzer (2011) offers a critical analysis of the moral panic (道德恐慌) surrounding sex trafficking, arguing that public discourse and policy responses have been shaped by ideological commitments rather than empirical evidence. Weitzer identifies several features of the dominant trafficking narrative that he regards as empirically unsupported or misleading: the inflation of victim numbers, the conflation of voluntary sex work with trafficking, the assumption that all migration for sex work involves coercion, and the portrayal of trafficking as a problem of individual evil rather than structural inequality.
Weitzer does not deny the existence of sex trafficking or minimize its harms. Rather, he argues that an empirically informed response requires distinguishing between trafficking (which involves coercion or deception) and voluntary migration for sex work (which, however constrained by economic circumstance, involves a degree of agency). The conflation of these distinct phenomena, he argues, produces policies that harm the very populations they purport to protect – for example, by criminalizing sex workers, restricting migration, and subjecting migrants to detention and deportation in the name of anti-trafficking enforcement.
This critical perspective has been contested by scholars and advocates who argue that the structural constraints on choice are so severe that the distinction between voluntary and coerced participation in the sex industry is analytically untenable. This debate reflects deeper disagreements within feminist theory and criminology about agency, structure, and the appropriate objects of criminalization.
Indigenous Women, Trafficking, and the MMIWG Connection
In the Canadian context, the trafficking of Indigenous women and girls (原住民妇女和女童) is a particularly urgent concern that intersects with the broader crisis of Missing and Murdered Indigenous Women and Girls (MMIWG; 失踪和被杀害的原住民妇女和女童). The 2019 National Inquiry into MMIWG documented the links between trafficking and the systemic colonial violence that has produced the conditions of poverty, family disruption, child welfare apprehension, and social marginalization in which trafficking recruitment thrives. Indigenous women and girls are disproportionately represented among trafficking victims in Canada, and their vulnerability is compounded by the historical and ongoing effects of residential schools, the sixties scoop, and the child welfare system.
Canada’s National Action Plan to Combat Human Trafficking (2012, updated 2019) identifies prevention, protection, prosecution, and partnership as its four pillars. However, critics have argued that the plan is inadequately funded, insufficiently attentive to the specific vulnerabilities of Indigenous communities, and too heavily weighted toward criminal justice responses at the expense of social and economic support for survivors.
Research centering the voices of trafficking survivors has revealed significant gaps between policy intentions and lived experience. Survivors frequently report that anti-trafficking enforcement causes harm through re-traumatization during criminal justice proceedings, immigration detention, and the loss of income when their workplaces are raided. Many survivors emphasize the need for stable housing, mental health services, economic opportunities, and immigration status regularization -- needs that are inadequately addressed by policy frameworks focused primarily on criminal prosecution of traffickers. The inclusion of survivor perspectives in policy development is increasingly recognized as essential but remains unevenly implemented.
Chapter 7: Migration, Smuggling, and Trafficking
The Migration-Crime Nexus
The relationship between migration (移民) and crime is one of the most politically sensitive and analytically complex topics in contemporary criminology. The movement of people across borders is shaped by vast structural forces – economic inequality, conflict, environmental degradation, demographic change – that operate far beyond the control of individual migrants. Within this context, criminal networks have emerged to facilitate, exploit, and profit from migratory flows.
The Trafficking-Smuggling Distinction
The legal distinction between trafficking and smuggling is enshrined in two separate UN Protocols adopted in 2000 alongside the Convention against Transnational Organized Crime: the Palermo Protocol on trafficking and the Protocol against the Smuggling of Migrants by Land, Sea and Air. The key legal differences are: trafficking involves exploitation as its purpose and does not require border crossing; smuggling involves facilitated border crossing and is defined by the migrant’s consent and the absence of ongoing exploitation. However, as scholars and practitioners have extensively documented, the boundary between smuggling and trafficking is frequently blurred in practice. Migrants who initially consent to smuggling arrangements may find themselves subjected to debt bondage, forced labor, or sexual exploitation upon arrival at their destination, transforming what began as a smuggling relationship into a trafficking situation.
Ganji on Irregular Migration and Smuggling
Ganji (2016) provides a detailed analysis of irregular migration (非正规移民) and the role of smuggling networks in facilitating it. Her research examines the experiences of migrants who employ smugglers to cross borders, revealing a complex and often exploitative relationship that defies simple categorization as either voluntary transaction or coerced trafficking.
Ganji documents the escalation of danger and cost associated with irregular migration as states have invested in border fortification and enforcement. Paradoxically, restrictive immigration policies have not reduced irregular migration but have instead increased the dependence of migrants on smuggling networks and the prices those networks can charge. The criminalization of migration has thus enriched criminal enterprises while increasing the physical danger, financial exploitation, and vulnerability of migrants.
The deaths of thousands of migrants attempting to cross the Mediterranean Sea illustrate the lethal consequences of the migration-crime nexus. Smuggling networks pack migrants into overcrowded and unseaworthy vessels, charge exorbitant fees, and bear no responsibility for the lives lost. European border enforcement policies that have pushed crossings toward longer and more dangerous routes have contributed to the escalating death toll. The financial architecture of Mediterranean smuggling involves complex networks of facilitators, recruiters, boat operators, and money agents spanning multiple countries. The International Organization for Migration has documented over 28,000 migrant deaths and disappearances in the Mediterranean since 2014.
Roxham Road and Irregular Border Crossings in Canada
In the Canadian context, the phenomenon of irregular border crossings (非正规过境) at locations such as Roxham Road in Quebec drew significant public and political attention between 2017 and 2023. Roxham Road became the primary entry point for asylum seekers crossing from the United States into Canada to circumvent the Safe Third Country Agreement (STCA), which required refugee claimants to make their claims in the first safe country they reached. By crossing at unofficial points rather than official ports of entry, asylum seekers could access the Canadian refugee determination system.
The closure of the Roxham Road loophole through an amendment to the STCA in March 2023 did not end irregular migration but redirected it to other crossing points and increased reliance on smuggling networks. The Canadian debate over irregular border crossings illustrated the tension between security concerns and humanitarian obligations, with critics of enforcement-first approaches arguing that the criminalization of border crossing drives migrants into the hands of smugglers and increases their vulnerability to exploitation.
Temporary Foreign Worker Exploitation
The exploitation of temporary foreign workers (临时外籍劳工) represents a form of trafficking-adjacent harm that operates within ostensibly legal migration channels. Canada’s Temporary Foreign Worker Program (TFWP) has been repeatedly criticized for creating conditions conducive to labor exploitation: workers’ immigration status is tied to a specific employer, creating a structural dependency that inhibits complaints about workplace abuse; workers are often housed in employer-provided accommodation that limits their autonomy; and enforcement of workplace standards is inadequate. Cases of wage theft, excessive working hours, unsafe conditions, and restriction of movement have been documented across sectors including agriculture, food processing, and domestic work.
Hubschle on the Political Economy of Migration and Trafficking
Hubschle (2017) provides a political-economic analysis of the relationship between migration and trafficking in the African context. Her work challenges the tendency in Western policy discourse to treat African migration primarily through the lens of criminality and security threat, arguing that such framing obscures the structural drivers of migration and the agency of migrants themselves.
Hubschle demonstrates that the distinction between legitimate migration, smuggling, and trafficking is often imposed by external actors – states, international organizations, NGOs – rather than reflecting the lived experiences of migrants. Many migratory journeys involve elements of all three: voluntary departure, facilitation by paid intermediaries, and exposure to exploitation or coercion at various points along the route. The categorical distinctions favored by legal frameworks do not map neatly onto these complex, fluid, and often contradictory experiences.
Hubschle also examines the financial flows associated with migration and trafficking in Africa, documenting the role of informal financial systems, mobile money platforms, and hawala networks in facilitating the movement of funds between migrants, smugglers, and families. These financial flows represent a significant economic dimension that is poorly captured by official statistics and inadequately addressed by regulatory frameworks designed for the formal financial sector.
Chapter 8: Cybercrime
The Digital Transformation of Criminal Enterprise
Cybercrime (网络犯罪) represents a fundamental transformation in the landscape of financial crime. The digitization of commerce, communication, and social interaction has created new categories of criminal opportunity, new mechanisms for the commission and concealment of crime, and new challenges for detection, investigation, and prosecution. Cybercrime encompasses both crimes that are enabled by digital technology (such as online fraud, identity theft, and cyber-facilitated trafficking) and crimes that target digital infrastructure itself (such as hacking, ransomware attacks, and distributed denial-of-service attacks).
Ransomware: WannaCry and Colonial Pipeline
Ransomware (勒索软件) – malicious software that encrypts a victim’s data and demands payment for its release – has emerged as one of the most significant cybercrime threats. The WannaCry attack of May 2017 infected over 230,000 computers in 150 countries, exploiting a vulnerability in Microsoft Windows that had been discovered by the U.S. National Security Agency and subsequently leaked. The attack disrupted hospitals, telecommunications companies, and government agencies, with the United Kingdom’s National Health Service particularly severely affected. The WannaCry attack was attributed to the Lazarus Group, linked to North Korea, illustrating the phenomenon of state-sponsored cybercrime.
The ransomware attack on Colonial Pipeline, which operates the largest fuel pipeline system in the United States, forced the shutdown of the pipeline for six days and triggered fuel shortages across the southeastern United States. The attack was carried out by DarkSide, a cybercriminal group operating a Ransomware as a Service (RaaS) model. Colonial Pipeline paid a ransom of approximately $4.4 million in Bitcoin, though the FBI subsequently recovered a portion of the payment. The attack demonstrated the vulnerability of critical infrastructure to cybercrime and the potential for cyber attacks to cause physical-world disruptions with national security implications.
Huey and Ferguson on Policing Cybercrime
Huey and Ferguson (2022) examine the challenges that cybercrime poses for law enforcement, focusing on the organizational, technical, and jurisdictional dimensions of cybercrime policing. Their research reveals a significant gap between the scale and sophistication of cybercriminal activity and the capacity of law enforcement agencies to respond.
Huey and Ferguson identify several structural obstacles to effective cybercrime policing. First, there is the problem of technical expertise: cybercrime investigation requires specialized skills that are in short supply within police organizations and that compete with more lucrative employment in the private sector. Second, the jurisdictional fragmentation of law enforcement – organized primarily at the national or sub-national level – is fundamentally mismatched with the transnational character of cybercrime. A phishing attack launched from Eastern Europe, targeting victims in North America, using servers in Southeast Asia, and laundering proceeds through cryptocurrency exchanges registered in the Caribbean, involves multiple jurisdictions whose legal systems, investigative capacities, and political priorities may differ dramatically.
Third, Huey and Ferguson document the challenges of inter-agency cooperation, both within and between countries. The organizational cultures, information-sharing practices, and accountability mechanisms of different agencies often impede the coordination required for effective cybercrime investigation. Even when formal cooperation frameworks exist, their practical implementation is frequently slow, cumbersome, and inadequate to the pace of cybercriminal operations.
Cryptocurrency and Crime
The relationship between cryptocurrency (加密货币) and crime extends well beyond ransomware payments. Cryptocurrencies have been used to facilitate drug trafficking on dark web markets, to launder proceeds of fraud and theft, to finance terrorism, and to evade sanctions. The pseudonymous nature of Bitcoin transactions initially created an illusion of anonymity, but law enforcement agencies have developed sophisticated blockchain analysis tools that have enabled the tracing and recovery of cryptocurrency used in criminal transactions. In response, cybercriminals have increasingly turned to privacy-focused cryptocurrencies such as Monero and to mixing services that obscure the transaction trail.
Business Email Compromise
Business email compromise (BEC; 商业电子邮件入侵) has emerged as one of the most financially damaging forms of cybercrime. BEC schemes involve the impersonation of corporate executives, vendors, or business partners through compromised or spoofed email accounts to authorize fraudulent wire transfers. The FBI’s Internet Crime Complaint Center has identified BEC as the most costly form of cybercrime, with global losses exceeding $43 billion between 2016 and 2021. BEC attacks exploit social engineering rather than technical vulnerabilities, targeting the human elements of organizational financial processes.
State-Sponsored Cybercrime and the Canadian Centre for Cyber Security
State-sponsored cybercrime (国家支持的网络犯罪) represents a distinctive category in which nation-states employ cybercriminal techniques for espionage, sabotage, financial theft, and geopolitical influence operations. North Korean state-sponsored groups have been linked to the theft of over $2 billion in cryptocurrency, while Russian, Chinese, and Iranian state actors have been implicated in espionage campaigns targeting government agencies, critical infrastructure, and intellectual property.
The Canadian Centre for Cyber Security (加拿大网络安全中心), established in 2018 as part of the Communications Security Establishment, serves as Canada’s national authority on cybersecurity. The Centre publishes the biennial National Cyber Threat Assessment, which identifies state-sponsored cybercrime, ransomware, and cybercrime-as-a-service as the most significant threats to Canadian organizations.
Savage on Emerging Cyber Threats
Savage (2024) extends the analysis to emerging cyber threats, examining the evolving landscape of cybercriminal activity in light of developments in artificial intelligence, cryptocurrency, and the Internet of Things. Savage documents the increasing sophistication of cybercriminal operations, which now employ advanced techniques including deepfake technology, AI-generated phishing campaigns, and automated vulnerability exploitation tools.
The emergence of Ransomware as a Service models illustrates the increasing professionalization of cybercrime. In these models, developers create sophisticated ransomware tools and make them available to affiliates in exchange for a share of ransom payments. This division of labor mirrors the franchise model of legitimate business, lowering the barriers to entry for cybercriminal activity and expanding the scale and scope of ransomware attacks. Victims range from individual consumers to hospitals, municipal governments, and critical infrastructure operators, with ransom demands ranging from hundreds to millions of dollars.
Savage also examines the expanding attack surface created by the Internet of Things, as billions of networked devices – from industrial control systems to home appliances – create new vulnerabilities that can be exploited for criminal purposes. The convergence of physical and digital systems raises the stakes of cybercrime from financial loss to potential threats to physical safety and critical infrastructure.
Chapter 9: Money Laundering
The Mechanics of Money Laundering
Money laundering (洗钱) is the process by which the proceeds of criminal activity are disguised to conceal their illegal origin and integrated into the legitimate financial system. It is the essential complement to virtually every form of profit-generating crime: without the ability to launder proceeds, criminals cannot enjoy the benefits of their activity without attracting the attention of law enforcement and tax authorities.
The three-stage model, while analytically useful, oversimplifies the diversity of money laundering methods. In practice, laundering techniques range from simple cash smuggling and structuring (breaking large cash deposits into smaller amounts below reporting thresholds, known as “smurfing”) to highly complex schemes involving trade-based money laundering, shell company networks spanning multiple jurisdictions, and the exploitation of professional intermediaries including lawyers, accountants, and real estate agents.
The Vancouver Model: Casino Money Laundering and the Cullen Commission
The Vancouver model (温哥华模式) refers to a money laundering scheme that exploited British Columbia’s casino industry to launder proceeds from drug trafficking and other criminal activity. The scheme operated through an informal value transfer system: individuals with large amounts of cash from criminal proceeds would lend the cash to high-stakes gamblers (often Chinese nationals seeking to move money out of China in circumvention of capital controls). The gamblers would use the cash to buy chips at BC casinos, gamble for a period, and then cash out, receiving a casino check that represented clean, legitimate funds. The original cash providers would be repaid in China through informal banking networks.
The Commission of Inquiry into Money Laundering in British Columbia, chaired by Justice Austin Cullen, was established in 2019 following investigative journalism and a series of government-commissioned reports that exposed the scale of money laundering in the province. The Commission documented how hundreds of millions of dollars in suspected criminal proceeds flowed through BC casinos, the real estate market, luxury car dealerships, and horse racing. The Commission's 2022 final report made 101 recommendations, including the creation of a provincial money laundering intelligence unit, the establishment of a publicly accessible beneficial ownership registry for real estate, and enhanced regulation of the casino, real estate, and luxury goods sectors. The Cullen Commission revealed that money laundering had been a systemic problem facilitated by regulatory failures, political indifference, and the complicity of financial intermediaries.
FINTRAC and Beneficial Ownership
The Financial Transactions and Reports Analysis Centre of Canada (FINTRAC; 加拿大金融交易和报告分析中心) is Canada’s financial intelligence unit, responsible for facilitating the detection, prevention, and deterrence of money laundering and terrorist financing. FINTRAC receives and analyzes reports from financial institutions, casinos, real estate agents, and other reporting entities, and disseminates intelligence to law enforcement and other agencies. However, FINTRAC has been criticized for its limited enforcement powers, its slow processing of reports, and the low proportion of suspicious transaction reports that result in actionable intelligence.
The question of beneficial ownership (实益拥有权) – the identity of the natural person who ultimately owns or controls a legal entity – is central to anti-money-laundering efforts. The use of shell companies, trusts, and nominees to conceal beneficial ownership is a primary technique of money laundering. Canada’s progress toward beneficial ownership transparency has been slow relative to international peers, though the establishment of a federal beneficial ownership registry and provincial registries in British Columbia and Quebec represent significant steps forward.
Markovska and Adams on Post-Soviet Money Laundering and Corruption
Markovska and Adams (2015) provide a detailed analysis of money laundering and corruption (腐败) in the post-Soviet context, examining the institutional conditions that have facilitated the large-scale extraction and laundering of wealth from the former Soviet states. Their research documents the central role of corruption in enabling money laundering, as state officials and financial regulators are co-opted to facilitate the movement of illicit funds.
Markovska and Adams identify several distinctive features of post-Soviet money laundering. First, the scale is extraordinary: the collapse of the Soviet Union and the chaotic privatization of state assets created conditions for the rapid accumulation of enormous wealth by well-connected individuals who used their political access to acquire state property at far below market value. The laundering of this wealth involved the movement of billions of dollars through Western financial institutions, real estate markets, and offshore financial centers.
Second, Markovska and Adams document the interpenetration of organized crime and the state in many post-Soviet contexts. The distinction between criminal and political elites, always analytically problematic, is particularly blurred in contexts where state officials simultaneously hold positions in criminal organizations, and where organized crime groups exercise influence over state institutions through corruption, intimidation, and the provision of services that the state cannot or will not deliver.
Shelley and Melzer on Terrorism Finance and Organized Crime
Shelley and Melzer (2008) examine the convergence of terrorism financing (恐怖主义融资) and organized crime, arguing that the financial infrastructure of transnational terrorism increasingly overlaps with that of transnational organized crime. They document the ways in which terrorist organizations finance their operations through drug trafficking, fraud, counterfeiting, extortion, and other criminal activities, and employ the same money laundering techniques as organized crime groups to move and conceal funds.
This convergence has significant implications for both counter-terrorism and anti-organized-crime strategies. The traditional separation of these domains – with counter-terrorism handled by intelligence and security agencies and organized crime addressed by law enforcement – is increasingly untenable when the same networks, financial channels, and personnel serve both purposes. Shelley and Melzer argue for a more integrated approach that recognizes the financial dimensions of terrorism as a form of organized crime and addresses both through coordinated strategies of financial surveillance, investigation, and disruption.
The informal value transfer systems – particularly hawala (哈瓦拉) networks – that serve diaspora communities for legitimate remittance purposes also provide channels for both terrorism financing and money laundering. The regulation of these systems poses particular challenges because of their decentralized structure, the absence of formal records, and the reliance on trust relationships that are opaque to external observers.
Chapter 10: Corruption
The Nature and Dimensions of Corruption
Corruption (腐败) – the abuse of entrusted power for private gain – is both a financial crime in its own right and an enabler of virtually every other form of financial crime discussed in this text. Corruption lubricates money laundering, facilitates drug trafficking, undermines environmental regulation, and shields corporate offenders from accountability. Transparency International (透明国际) defines corruption broadly to encompass bribery, embezzlement, nepotism, fraud, and the abuse of discretionary power, and publishes the annual Corruption Perceptions Index (CPI; 腐败感知指数) that ranks countries by perceived levels of public-sector corruption.
Corruption is analytically distinct from other financial crimes because it necessarily involves the exercise of public or institutional authority. The corrupt official does not merely break the law; she betrays the trust inherent in her position. This betrayal of trust has consequences that extend beyond the immediate financial harm: it erodes public confidence in institutions, distorts the allocation of public resources, undermines democratic governance, and disproportionately harms the poor and marginalized who depend most heavily on the integrity of public services.
SNC-Lavalin and Corporate Corruption in Canada
The SNC-Lavalin case, discussed in Chapter 3 in the context of fraud, is equally significant as a case of corruption. The company’s payments to Libyan officials constituted bribery of foreign public officials, an offense criminalized under Canada’s Corruption of Foreign Public Officials Act (CFPOA). The case exposed the tensions between Canada’s legal obligations under international anti-corruption conventions and the political pressure to protect a major Canadian corporation from the consequences of a criminal conviction, which would have barred SNC-Lavalin from bidding on federal government contracts for ten years.
The WE Charity Scandal
The WE Charity scandal (WE慈善机构丑闻) of 2020 raised questions about the relationship between political power, charitable organizations, and public contracting in Canada. The Trudeau government’s decision to award a sole-source contract worth up to $543 million to WE Charity to administer the Canada Student Service Grant program prompted allegations of conflict of interest, given the Trudeau family’s financial and personal connections to the organization. Ethics Commissioner Mario Dion found that Prime Minister Trudeau had violated the Conflict of Interest Act by failing to recuse himself from the decision. While the WE Charity scandal did not involve bribery in the conventional sense, it illustrated the structural conditions under which the boundary between legitimate political relationships and corrupt influence becomes difficult to discern.
Chapter 11: Responses to Financial Crime
The Regulatory Landscape
The responses to financial crime operate across a complex institutional landscape that includes criminal law enforcement, civil regulation, administrative oversight, international cooperation frameworks, and private-sector compliance programs. As Snider (2015, Chapter 5) argues, the effectiveness of these responses is fundamentally shaped by the political-economic context in which they operate. In periods of neoliberal ascendancy, the regulatory capacity of the state has been systematically diminished through deregulation, budget cuts, and the ideological delegitimation of government intervention in markets.
Snider on the Decline of Corporate Crime Regulation
Snider (2015) provides a sweeping historical analysis of the trajectory of corporate crime regulation, documenting a pattern of regulatory rise and decline that she attributes to shifts in the balance of class forces. The regulatory advances of the mid-twentieth century – workplace safety legislation, environmental protection, consumer protection, securities regulation – were products of social movements, labor struggles, and political conjunctures that temporarily empowered reformers. The neoliberal counter-revolution that began in the 1970s and accelerated in the 1980s and 1990s systematically reversed these gains, weakening enforcement agencies, reducing penalties, and substituting voluntary compliance programs for mandatory regulation.
Snider argues that the decline of corporate crime regulation is not simply a matter of policy choice but reflects the structural power of capital within capitalist democracies. Corporations exercise influence not only through direct political lobbying but through their control over investment, employment, and economic growth. Governments that impose stringent regulations risk capital flight, reduced investment, and economic contraction, creating a structural incentive to compete for corporate investment by offering favorable regulatory environments – a dynamic often described as the race to the bottom.
Responsive Regulation: Braithwaite’s Enforcement Pyramid
Braithwaite’s (1989, 2002) model of responsive regulation (回应性监管) offers a framework for thinking about more effective regulatory design that avoids the limitations of both strict command-and-control regulation and pure self-regulation. The core concept is the enforcement pyramid (执法金字塔): regulators should begin at the base of the pyramid with persuasion, education, and cooperative compliance measures, escalating progressively through warnings, civil penalties, criminal prosecution, and ultimately license revocation or incapacitation for the most serious or persistent offenders.
Braithwaite’s model has been influential in regulatory design across multiple domains, including environmental regulation, occupational health and safety, tax administration, and financial services regulation. However, critics argue that responsive regulation may be co-opted by powerful regulated entities that exploit cooperative engagement to weaken regulatory standards, and that the model underestimates the structural power asymmetries between regulators and the corporations they regulate.
Corporate Compliance Programs
Corporate compliance programs (企业合规计划) have become a ubiquitous feature of corporate governance, driven by regulatory requirements, sentencing guidelines that reward organizations for maintaining compliance systems, and the threat of reputational damage. Effective compliance programs typically include codes of conduct, employee training, internal reporting mechanisms (hotlines, ombudspersons), risk assessments, monitoring and auditing systems, and disciplinary procedures for violations.
However, the evidence on the effectiveness of compliance programs is mixed. Research suggests that compliance programs vary enormously in their genuine impact, with many functioning as window dressing – symbolic gestures designed to satisfy regulators and reduce sanctions in the event of prosecution rather than genuine mechanisms of behavioral change. The effectiveness of compliance programs depends critically on organizational culture, the commitment of senior leadership (“tone at the top”), the independence and authority of compliance personnel, and the willingness to impose real consequences for violations.
Deferred Prosecution Agreements
Deferred prosecution agreements (DPAs; 延期起诉协议) have become an increasingly common tool for resolving corporate criminal cases, particularly in the United States, the United Kingdom, and (since 2018) Canada. Under a DPA, the prosecution agrees to defer charges against a corporation in exchange for the corporation’s agreement to pay financial penalties, cooperate with investigations, implement compliance reforms, and submit to monitoring for a specified period. If the corporation fulfills the terms of the agreement, the charges are dropped; if it fails to comply, prosecution proceeds.
Proponents of DPAs argue that they provide a mechanism for holding corporations accountable while avoiding the collateral consequences of criminal conviction – loss of government contracts, stock price decline, employee layoffs – that may harm innocent parties. Critics argue that DPAs allow corporations to buy their way out of criminal liability, that the financial penalties imposed are often modest relative to the harm caused and the profits generated, and that the monitoring and compliance requirements are often inadequately enforced.
Whistleblower Protections
Whistleblower protection (举报人保护) is recognized as a critical component of effective financial crime enforcement, since internal sources often provide the earliest and most detailed information about corporate wrongdoing. Canada’s federal whistleblower protections, provided primarily through the Public Servants Disclosure Protection Act (2007), have been widely criticized as inadequate. The Act’s scope is limited to federal public servants, its processes are slow, and the penalties for reprisals against whistleblowers are weak. Unlike the United States, where the SEC’s whistleblower program offers financial rewards of 10 to 30 percent of sanctions exceeding $1 million, Canada provides no financial incentives for whistleblowing, reducing the motivation to come forward.
Paternoster on Deterrence and Corporate Offending
Paternoster (2016) provides a nuanced assessment of the deterrence model as applied to corporate crime. While the rational choice framework suggests that increasing the certainty and severity of sanctions should reduce offending, Paternoster argues that the deterrence of corporate crime faces several distinctive obstacles.
First, the probability of detection is very low for most forms of corporate crime. The complexity of corporate operations, the opacity of financial transactions, and the limited resources of enforcement agencies mean that only a small fraction of corporate offenses come to the attention of authorities. The perceived risk of punishment is correspondingly low, undermining the deterrent effect of even severe sanctions.
Second, when sanctions are imposed, they are often modest relative to the profits generated by the offending conduct. For a corporation with annual revenues in the billions, a fine of even several hundred million dollars may represent an acceptable cost of doing business. Paternoster argues that effective deterrence requires not only increasing the magnitude of sanctions but fundamentally restructuring the enforcement system to increase the probability of detection and the personal liability of individual decision-makers.
Schell-Busey et al. on Meta-Analysis of Corporate Crime Deterrence
Schell-Busey et al. (2016) provide a meta-analysis of empirical research on corporate crime deterrence, synthesizing findings from multiple studies to assess the overall effectiveness of different deterrence strategies. Their analysis reveals mixed evidence for the deterrent effect of formal sanctions, with considerable variation across different types of offenses, industries, and regulatory contexts.
Schell-Busey et al. find that the certainty of punishment consistently emerges as more important than its severity in deterring corporate offending – a finding consistent with deterrence theory but challenging for practical policy, given the difficulty and expense of increasing detection rates. They also find some evidence that informal sanctions – such as reputational damage, public shaming, and the stigma of criminal prosecution – may have a significant deterrent effect, particularly for individual corporate executives whose personal standing and future career prospects are at stake.
Schell-Busey et al. examine the evidence on corporate compliance programs, which have become a ubiquitous feature of corporate governance in response to regulatory requirements and sentencing guidelines that reward organizations for maintaining compliance systems. The evidence on effectiveness is decidedly mixed. While some studies suggest that well-designed compliance programs can reduce offending, others find that compliance programs often function as window dressing -- symbolic gestures designed to satisfy regulators and reduce sanctions in the event of prosecution, rather than genuine mechanisms of behavioral change. The effectiveness of compliance programs appears to depend critically on organizational culture, the commitment of senior leadership, and the independence and authority of compliance personnel.
Their meta-analysis also highlights significant gaps in the empirical literature, particularly regarding the effectiveness of extra-legal sanctions, the role of organizational culture in shaping compliance, and the comparative effectiveness of different regulatory approaches (such as command-and-control regulation versus responsive regulation versus self-regulation). They call for more rigorous experimental and quasi-experimental research designs to address these questions.
International Cooperation and Its Limits
The transnational character of financial crime demands international cooperation in investigation, prosecution, and asset recovery. A dense network of international institutions and legal frameworks has developed to facilitate this cooperation, including mutual legal assistance treaties, the Financial Action Task Force (FATF), Interpol, Europol, and various UN conventions and protocols. Yet the effectiveness of these mechanisms remains constrained by fundamental tensions between the sovereignty of states and the transnational character of crime.
The limits of international cooperation are evident in the persistent existence of jurisdictions that offer financial secrecy, the uneven implementation of anti-money-laundering standards, and the political obstacles to effective asset recovery. Wealthy countries that benefit from inflows of illicit capital – through their real estate markets, financial institutions, and corporate service providers – have limited incentives to cooperate fully with the enforcement efforts of other jurisdictions.
Toward a Structural Response
A sociologically informed approach to financial crime demands responses that address not only individual offenders and discrete offenses but the structural conditions that generate financial crime as a systemic phenomenon. This requires attention to the political-economic forces that shape regulatory capacity, the institutional design of enforcement agencies, the global architecture of finance, and the ideological frameworks that normalize corporate harm and render it invisible.
Friedrichs (2010) argues that the category of “trusted criminals” – individuals and institutions that exploit positions of trust and respectability for illegal gain – captures a distinctive feature of financial crime that differentiates it from conventional crime and demands distinctive analytical and policy responses. The trust that facilitates financial crime is not merely interpersonal but institutional: it is embedded in the structures of professional certification, corporate governance, and financial regulation that constitute the infrastructure of modern capitalism.
The challenge for criminology, and for society more broadly, is to develop frameworks of analysis and programs of reform that take the structural foundations of financial crime seriously – not merely as an academic exercise but as a practical project of reducing the enormous harms that financial crime inflicts on individuals, communities, and the global environment.