Skip to main content Accessibility help
×
Hostname: page-component-7479d7b7d-m9pkr Total loading time: 0 Render date: 2024-07-15T22:35:18.390Z Has data issue: false hasContentIssue false

2 - Routine Activities and Transnational Crime

Published online by Cambridge University Press:  05 October 2014

Marcus Felson
Affiliation:
Rutgers, the State University of New Jersey, USA
Mangai Natarajan
Affiliation:
John Jay College of Criminal Justice, City University of New York
Get access

Summary

OVERVIEW

All crime is local. That statement seems to be brusque and to conflict with the existence of transnational crime. But in this chapter I will defend the statement and show how emphasizing that crime is local helps us understand transnational crime to a greater extent.

Every criminal act can be disaggregated into a sequence of events. If this chain or sequence includes a border crossing, it is easily classified as transnational. But that classification does not tell the whole story. One or more elements in the sequence has to occur locally (see Levi & Reuter, 2006; van Duyne & Levi, 2005). Indeed, all crime requires a local focus of action at some point, perhaps at most points in its sequence. We expect that most transnational crimes include a chain of local actions that outnumber the border-crossing pieces of the chain. Indeed, local people on both sides of a border are usually involved in local aspects of transnational crimes.

This same argument applies to electronic crimes, which have local requirements in virtually all cases, such as unsupervised computers or local cooperation among offenders. Many criminal acts that eventually affect distant locations nonetheless occur initially in a much more limited setting, perhaps with several additional local requirements.

Transnational crimes are important, but they have not replaced or crowded out traditional crimes, such as direct physical theft and violence carried out in more or less the usual ways. That conclusion also misunderstands ways in which electronic crimes have very local requirements. Thus a cyber offender needs access to local computer equipment and local ways to hide identity or evade authority. Nor should we assume that the presence of offenders born abroad proves that crime is transnational, since many of these offenders do ordinary things, such as stealing, evading, confounding, invading, attacking, or confusing others.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ekblom, P. (1997). Gearing up Against Crime: A Dynamic Framework to Help Designers Keep Up with the Adaptive Criminal in a Changing World. International Journal of Risk, Security and Crime Prevention, 2(4), 249–65.Google Scholar
Ekblom, P. (1999). Can We Make Crime Prevention Adaptive by Learning from Other Evolutionary Struggles?, Studies on Crime and Crime Prevention, 8(1), 27–51.Google Scholar
Ekblom, P. (2000, March). Future Crime Prevention – a “Mindset Kit” for the Seriously Foresighted. London: Policing and Reducing Crime Unit. London: Home Office Research Development and Statistics Directorate. (, Accessed June 25, 2010.)
Felson, M. (2002). Crime and Everyday Life. Third Edition. Thousand Oaks, CA: Sage and Pine Forge Press.Google Scholar
Felson, M. (2006). Crime and Nature. Thousand Oaks, CA: Sage and Pine Forge Press.Google Scholar
Felson, M. & Clarke, R. V. (1997). Business and Crime Prevention. Monsey, NY: Criminal Justice Press.Google Scholar
Felson, M. & Peiser, R. (1998). Reducing Crime through Real Estate Development and Management.Washington, D.C.: Urban Land Institute.Google Scholar
Levi, M. & Reuter, P. (2006). Money Laundering: A Review of Current Controls and Their Consequences. In Tonry, M. (Ed.), Crime and Justice: An Annual Review of Research, Vol. 34. Chicago: Chicago University Press.Google Scholar
Newman, G. & Clarke, R. V. (2003). Superhighway Robbery: Preventing E-commerce Crime. Portland, OR: Willan.Google Scholar
Newman, O. (1972). Defensible Space: Crime Prevention through Urban Design. New York: Macmillan.Google Scholar
van Duyne, P. & Levi, M. (2005), Drugs and Money. London: RoutledgeGoogle Scholar
Williams, M. (2004). “Understanding King Punisher and His Order: Vandalism in an Online Community – Motives, Meanings and Possible Solutions.” Internet Journal of Criminology. Retrieved June 13, 2005, from http://www.internetjournalofcriminology.com

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×