Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.
A PhD applicant did me the service of sending a list of questions in advance to see if we would be a good fit. It was a fantastic idea which led to a focused and creative discussion. It got me thinking about all the questions that went unasked in various PhD supervisions I have had. I suggest that all potential and starting PhDs can ask this of their supervisors early on. It is a little like those pre-marriage courses the Catholic church runs for couples about to be cleaved, where they work out how long it will last. The aim is not to see if you are of one mind, but to set out what you expect of each other and of the PhD itself. A lot of trouble can be avoided then. I’ve adapted some of the questions here.
1. Why do you supervise PhDs? What do you get from doing it?
The first question is about where supervision fits in the supervisor’s conception of an academic life. It is central to what they think the PhD is. That can vary between disciplines and inviduals. A supervisor might see a PhD student as someone to work on their projects, in a lab model, an emerging colleague, or someone who will learn advanced skills and move into industry. As ever, when we ask questions of others these are really about ourselves. Why do I want to do a PhD? Where does it sit in my direction as a person?
2. How many PhDs are there in the department? What do they study? How do you work with them?
This is a good question to situate supervision in terms of the how you fit into the intellectual community you will be joining. It is important to understand how student and supervisor plan to communite, and whether the supervisor is a channel for students to meet each other. One of the best ways of learning is from being around people who know more than you, who are further on in the journey. Will the PhD have opportunities to do that?
3. How do you deal with hierarchy in the relationship?
First, by not pretending it isn’t there. Hierarchy informs most working relationships and is no bad thing. It is a bad thing if it’s unthinking, or hidden, or people pretend it does not exist when it does. It is not a bad thing when the senior person in the hierarchy looks out for those below them. I expect my PhD students to become experts in their own area and I will defer to them on their knowledge. I also expect students to understand that when I say ‘don’t do it like that’ or ‘you have to include this or that in your writing’ that I am saying this because that is how you do a PhD and they will come a cropper if they do not defer to me on that. Much better to get the tough stuff out there early on.
4. How do deal with problems and conflicts?
I like this one because it is a bit of a challenge. Conflicts should not be expected but can arise in any working relationship and it is best to be open about that. And sometimes differences cannot be directly resolved.
Setting out ground rules as in above does not mean you avoid difficulties or anything like that. It does allow you to start with a better idea of who each other are and what you want out of the working relationship.
Then there are questions to ask yourself. There are the obvious ones – what do I want to find out about, how do I want to do it – and the existential ones, like why am I doing a PhD? What do I wnat to get from it? These will guide you in the choices you make.
The aim of this post is to provide a work in progress demo of how using titles for your paragraphs can structure your writing. The idea is that each paragraph has a named purpose in bold. I remove these before submitting the article. The titles add up to a narrative for the paper and so help structure what each part does.
A darknet vendor of forged dollars and their community: a distributed community of illicit practice
Abstract
The aim of this article is to understand a particular kind of criminal association which allows for cooperation and evaluation of a shared crime script and that functions as a distributed community of illicit practice. This article presents a crime script analysis of a darknet cryptomarket based counterfeit currency vendor and their community, putting the script into a technical-material context. It outlines the two interlinked crime scripts covering the last two stages of the counterfeit currency distribution system, for the currency vendor and middleman, ‘Benjamin’, and the buyer who will use the currency. The discussion forum allows each script to be fine tuned and creates feedback for the vendor on the quality and effectiveness of the notes. The online community is critical to the distribution of the notes and to their effective use. It forms a learning infrastructure, promotes semi-professional performances and evaluates risk. Counterfeit cash use is both a rationally structured crime, and an expressive one.
Introduction: Community developed modus operandi
What the study does: This paper describes the final stages of a counterfeit currency distribution network operating using a Tor darknet cryptomarket, covering the phase from secondary distribution to retail use. Cryptomarkets have gained prominence as novel market infrastructures primarily for the distribution of illicit drugs (Barratt and Aldridge 2016). The cryptomarket is shown to function as the ‘last mile’ distributor (Dittus, Wright, and Graham 2017) of counterfeit currency to buyers who will use it in the field, either individually or in tandem with an organised group. The case shows an example of a functioning supply chain from producer to final user and demonstrates how the darknet functions as both a distribution mechanism for the product and a learning environment for distributor and users, where they share user defined crime scripts for the successful use of counterfeit currency. The paper focuses on the process by which users develop and test effective crime scripts, what it tells about their priorities, their accounts of motive, and how they position themselves in relation to the wider illicit economy. It theorises the particular kind of criminal association involved as a distributed community of illicit practice, where networks are anonymous and temporary but effective in assessing the technical value of counterfeit notes and the practical risks and challenges involved in their use.
Suggest an audience: Counterfeiting is tackled by a range of bodies including the specialist policing taskforces such as the UK National Crime Agency Central Office for the Suppression of Counterfeit Currency and Protected Coins, central banks, and retailer/banking business organisations . Why it matters: Forged currency involves immediate risks to those handling the notes and longer term potential harms in damaging trust in the cash economy. There is a concentration of harm among frontline staff and smaller businesses. Cashiers or waiting staff who unwittingly handle fake notes might have their wages docked or be prosecuted. Smaller businesses which handle more cash will likewise be more at risk. It damages trust and costs are socialised to the rest of the economy. The most cash dependent demographic in society is also the part of the population that has least access to banking systems and credit and are most reliant on cash for paying and being paid (Lupo-Pasini 2021). As economies become more digitised and cash is steadily squeezed out of mainstream payment processes the harm of counterfeiting is increasingly concentrated among the more marginalized groups. Concerted efforts to tackle counterfeiting by reducing dependence on cash and actively targeting counterfeiting does not improve their position nor create alternative routes to finance for them. In fact it may have a damaging effect on the unbanked and technologically marginalised, particularly in developing country contexts (Wang 2020).
Get this in proportion: Currency counterfeiting is relatively uncommon. In 2003 the US Federal Reserve estimated that less than 1 in 10000 currency notes were counterfeit (Judson and Porter 2003), a result also reported for the Canadian dollar (Chant 2004) and estimated at 1 in 40,000 for the UK Pound Sterling (Bank of England 2022). Counterfeiting of the Indian Rupee is more common and appears to have been rising significantly from 2019 (Reserve Bank of India 2019, 2022). Money laundering through electronic means and crimes such as cheque fraud and card-not-present fraud are much more significant in terms of loss and in spreading corruption and funding the activities of organised criminal groups. Changes in the era of debt led/credit fuelled capitalism have further limited the opportunities for counterfeiting currency when more lucrative rewards lie in defrauding the banking sector (Kahn and Roberds 2008). Improved detection of fakes and improved note design have increased the technical demands on counterfeiters. Despite that there is still enough of an incentive for the practice to persist and even grow among some currencies such as the rupee, while there has in contrast been a decline in counterfeit euro circulation (European Central Bank 2021).
We should still care: Despite the challenges presented to counterfeiters, cash forgery persists. It evolves and shifts with the value put on various cash types and denominations, and the security/detection technology employed by central banks. Increasingly banknotes are designed as one element of a technological whole which encompasses surveillance, processing and detection technologies. The rise of automated processing points such as supermarket autopay terminals changes the process away from human detection. Machines can be designed to be more sensitive to particular aspects of the note such as precise weight or shape. These changed technological assemblages shift common understandings of what cash is in symbolic and practical terms, for example, from a store of capital to an object of value that can vary independently of its stated face value (Lemon 1998). Hinge – it’s a niche but an interesting one: However populations do at times return to cash. The growth in cash using during the pandemic also makes it likely that there are more opportunities for counterfeiting. Forgery may be beginning to matter more. At November 2021, US currency in circulation amounted to 2,116.4 US$ billion in seasonally adjusted figures, 9.9% of the M2 money supply (Board of Governors of the Federal Reserve 2021). Despite the general move to digital payments, the cash supply has steadily grown throughout 2020/21 along with a broad increase in the money supply. The growth reflects central banks’ intervention in the economy under the Covid-19 pandemic. Therefore cash continues to matter both as a technological system and one which has an evolving significance alongside its digital counterpart.
A theoretical postulate shows my contribution: Counterfeiting has a role in the crime business model. The main problem in maintaining the counterfeit currency economy is that to have any use value notes must circulate into the real economy quickly and in so doing are effectively nullified. They are detected and eliminated or become in any case useless to the criminals producing and using them. Criminals depend on the interface with the licit economy to wash fake notes into real money or goods. As a result the counterfeit economy is inherently parasitic on both the legal and illegal economies and is no way self sustaining, in contrast to for example the illicit drug market. Furthermore there a tension in the business model. To make the most from them counterfeit notes need to be of high value ($50 and $100) which are likely to attract more scrutiny when used. For lower denominations such as $10 or $20 many more transactions will have to take place to put them into use, raising the time and labour cost. Businesses learn from counterfeit ‘attacks’ and therefore are risky to hit more than once. All that makes it difficult to keep a counterfeit currency business going.
This is an interesting intersection: Counterfeit currency is characterised by many embedded techno-material factors such as the advent of desktop publishing and laser printing. The US Federal Reserve in 2003 note the cost of creating plausible counterfeits (Judson and Porter 2003). However distributed digitally enabled manufacturing appears to have brought some of the startup/fixed capital costs down (Li and Rocheteau 2011) and offset lithography can produce quality notes rapidly (NCA). Distribution is still very costly as they must be widely spread in order to be successful used. That may be an area where things have changed given the expansion in money mule and other distributed money laundering activity which lends itself more easily to counterfeit currency distribution. Therefore the counterfeit business has a number of challenges. It needs to maintain a throughput of users who can be upskilled to effectively make use of the product, be technologically adept, and has to manage the physical process of distribution. Second contribution I make: The paper takes the approach that counterfeit current distribution use is a rational and expressive form of techno-crime (Hayward 2007).. While one approach has been to analyse techno-crime as a modality (Van Nguyen 2021) I analyse it as a material context constitutive of criminal actors’ capacities. As technology is now so embedded we have to move past that and think of tech as part of the material matrix combining different technological forms and virtual and real world spaces.
The field make an effective case study because: Cryptomarkets are an effective part of that matrix. They are open, anonymous markets hosted using the Tor onion hosting service. Combined with bitcoin or another cryptocurrency payment system they allow goods to be sold in relative anonymity and without buyer and seller meeting. The seller posts a product listing and the buyer pays using a decentralised cryptocurrency which is held in market escrow. The package is sent to them through postal service, courier or dead drop. On receipt, or after a certain amount of time has elapsed, the payment is released to the seller. At least in theory that is the process, however increasingly sellers require payments immediately, showing how power shifts in a retail market towards the seller (Childs et al. 2020). The main meat of cryptomarkets is illicit drugs. The vast majority of the trades taking place are in illicit drugs. Despite the drug trade up to that point being cash heavy, a part of it was able to transfer to being a digitally mediated, remote business. Alongside drug markets, other trades existing, in for example malware, stolen goods, and counterfeit currency. Counterfeit currency is an example of a product which in theory could adapt well to cryptomarket distribution but that faces several conceptual and practical challenges in doing so.
Show direction: This article will examine the micro-process of last mile distribution and the interface between user purchase and practice. Research Questions this paper addresses:
What crime scripts are used by currency vendors and buyers?
How do counterfeit vendor and user make use of the technical/material qualities of the notes?
How does the social structure of the vendor-user relationship work with or against the CS?
How does counterfeit currency operate as part of its own technical assemblage
Method
Introduce the conceptual construct: the criminal community shares and tests the crime script against real world practice. Scripts are not wholly evolved and are going to be adapted all the time. The community closes the loop on that. The crime script consists of three basic stages prepare/pre-empt, doing/actualizing, end state/reset. It has to function as a whole set, a failure in one element cause the script to cease functioning. The crime script encapsulates the conditions for the act to occur, the preparation, entry/action and exit requirements and the post-condition. Dividing the script into its strategic and tactical components allows interventions to be planned which disrupt the criminal opportunity.
How the large case set links to the concept: Cryptomarkets are a place of ‘offender convergence’ (Felson 2006) characterized by ‘extended co-offending’ (Felson 2009), and they have some unique qualities as criminogenic spaces. Offenders can liaise and share intelligence and material without meeting. They provide a quality feedback loop where buyers discuss and compare products. They can be a testing ground for new products and new criminal business models. The particular cryptomarket hosting Benjamin is an open model. Anyone can join. Most goods and services can be offered, other than child pornography. Vendors may restrict customers according to location, willingness to spend, or a preexisting relationship.
The research design is constrained by the data: The project uses a single case study of a discussion between counterfeit dollar vendor and their customers. The discussion takes place over a long time period, allowing the evolving practice of both vendor and users to be followed. Mapping vendor and user crime scripts allowed me to systematise my understanding of their practice and develop a generalised outline of each players’ approach to executing their crime.
The paper makes a methodological contribution: Methodologically, the paper addresses a challenge of criminological research with dispersed entities, non-synchronous interactions, non-human. Draw on existing social research such as ethnography of infrastructures, multi-sited ethnography, hybrid ethnography ‘Material’ = : I analyse the technology used in material terms rather than as the crime medium. Beyond tech as a modality/fabric for crime and onto tech as a material context constitutive of actors.
Outline the general processof how I got here: Crime script analysis is a sequence analysis method of criminal knowledge formation. It follows four broad stages: Preparation – identification of opportunity and means. Assembly – putting the criminal into place, assembling the necessary precursors. Commission – the crime commission itself. Post-activity – getting away, extracting value, other necessary end states to reset the sequence (Chainey and Alonso Berbotto 2021). Each stage can be broken down into further elements depending on need. Dehghanniri and Borrion (2016) model the process to produce the crime script. The first step defines the problem, such as wage theft or dumping waste in the environment. It also shows what the crime script is intended to do which guides the analyst to the level of detail needed. An analysis that will be used in deploying surveillance will have different needs to one which seeks to change compliance rules. The second step elaborates the information requirements which flow from that: the analyst might be interested more in how this crime is committed, who is involved, and/or what facilitates it. The narrative analysis was key to allowing me to understand much more about how the script was developed and finessed by the group.
The specific process, neatly: The discussion was first open coded and then recoded according to the crime script stages for both the vendor and currency users as in table 1. Critical stages, cast and conditions for each process, vendor and user, were identified as detailed by Thompson and Chainey (2011). Contextualisation codes such as ‘Deference to community’ were also created. Context codes were in part derived from the existing literature, for example, the importance of claims to ‘insider’ roles and knowledge (Holt and Lee 2020). This was done in order to place the CSA in a material context. Matrix coding was then conducted cross tabulating the contextualizing codes with the CSA codes. These codes fed into the crime script coding, for example, technical features were coded and then distributed according to their function in the precondition/actualisation parts of the script. That exposed the technical, stealth, performative and organisational features at different stages of the CS execution. Cases were created for each contributor to the forum and the attribute function was used to record their role/stance. Text was coded to every contributor. Possible roles were: vendor, valid buyer, sock puppet. The forum has 72 cases of which x were xx. Vignettes were created for each participant, providing a sketch of their participation, for example, whether they changed position or left over time. Open data principles have been applied. The dataset is available and archived by the University of Edinburgh.
Findings
Meta criminal context: Benjamin (gender unknown) is a re-seller for the supplier Willy.Clock who had developed a public profile at the time and was known to the other members of the forum, and who was supported by another distributor, Mr. Mouse (Krebs 2014). Willy.clock is a Uganda based counterfeiter, Ryan Andrew Gustafson who was arrested in 2014 and who pled guilty in 2018 to charges of counterfeiting.
There is a network of sites validating each other so participants do not take anything on trust: Another onion site hosted support for note users and was used to validate the identities of distributors as a basic authenticity check. There was a well known distribution logic at work: The NCA states that criminal networks operate by breaking bulk production into smaller units that can be distributed and used by lower level criminals, so this appears to be a case of that being done. Benjamin introduces themselves in what becomes a long thread where buyers return to critique their product and debate how it should be used. Benjamin responds by defending the product, saying that buyers are using it improperly, and eventually agreeing that the counterfeit notes are not what they were.
Define the process in stages: The process is one of a spiral where the notes are tested in real world use and refined. The scrip derived from Benjamin and friends is therefore part of a meta-crime script involving the testing and innovation of the production process. Benjamin’s second stage role meant they could palm off some of the responsibility for poor quality product onto the supplier. The discussion was characterised by in depth explorations of the technical features of the notes, their consistency and reliability. Some participants appeared to be much closer to Benjamin and interacted with them outside the forum via a messaging service. Contributors ranged from these close accomplices to more casual users of the notes who were much less committed to the crime script.
The group context: To an extent the group as a whole worked on developing their crime script through comparing different experiences with using the notes, their opinions on their technical qualities, and advice about how to successfully use them without being detected. In this way what mattered to them became apparent. The technical qualities of the notes were a means to an end: their ability to use them successfully and then use the knowledge gained to buy more. Successful repeat use was
The interactional context: the forum allows for critique and requires a level of commitment from Benjamin. Benjamin introduces themselves as a known quantity, with feedback from another cryptomarket, the Black Market. They set out the security features of the product they are selling. It is claimed to be single ply, a security strip on the $100 dollar note, the ability to pass the pen test, a watermark, accurate colour using offset lithography, colour shifting ink, microprinting, a believable physical texture and resilience when dunked in water. The product seems to be high quality. Benjamin immediately adds a caveat. The bills do not contain magnetic ink, ferrofluid added to the bill to give it a distinct magnetic signature. That allows machines to distinguish between denominations and to reject fakes. Benjamin begins with a clear statement: any problems in passing the currency off as real are due to the failure of the buyer to adhere to an effective protocol.
Narrative breakdown: the thread begins positively. It all began so well – the golden period: sales and feedback are good. Benjamin begins with $100 notes and teases customers with the prospect of $50s and $20s. Early on after the thread begins they claim to have sold 300 $100 notes, for a face value of $30,000. Amounts purchased ranged up to 100 notes, $10,000 face value. They charge 50% of the face value of the notes though bulk buyers can obtain a larger discount. Buyers express excitement and anticipation for Benjamin receiving new stocks to pass onto them. The first bat h is well received. The second batch Benjamin sends out much less so. The quality of the notes deteriorates and users become disgruntled. A back and forth happens with one critic called out as a shill, and gradually disgruntlement builds as other users who had previously praised the notes now begin to question them. At this point the forum starts to divide. Users who have success with the notes allege that it is buyer failure to use them properly that is responsible for any problems.
If anybody finds their notes so atrocious, dunk them in water and wash all of the pen treatment off. It won’t pass the pen test, but it will sure as hell feel like real money … Alternatively, read through the forums and pay attention to what others to do give them their own touch. I’m not into replying to this negative BS, but I’ll manage to give you these few pointers.” Benjamin
One instance of a general phenomenon: As with other illicit and legal markets, there is a tendency towards bulking up sales following initial success. Benjamin decides to set a five note minimum order. Some buyers respond that this freezes them out. Note quality starts to decline:
“Lastly, and this is what is everyones biggest complain/concern so far, is the feel. Unless the clerk is wearing gloves I don’t know how they wouldn’t notice most of the bills waxy feel in comparison to the real notes. So that would be a dead give away to people who handle money regularly.”
Narrative turn with some colour: There then begins a conflictual phase in which Benjamin alternatively defends themselves and disappears for a time, stating they are working on fixing the problems with the notes that buyers have started to identify. Some participants sought to defend the operation from criticism. In one section, the discussion focused on security researcher Krebs (link) was sent counterfeit notes which he described as not being of very good quality. Several participants explained this away as a fakeout by Willy.Clock, the producer:
I think it was an inside operation by WC and Mouse if I had to guess, and ya thousands and thousands of retailers use Krebs and even catch up with him on Twitter, and everything seen on Krebs gets instantly passed down to loads of other websites and news sites too, if you google Mr Mouse counterfeits he’s all over the place thanks to Krebs.
The aim, they allege, was for the producer to spread misinformation to retailers about what they should look for in counterfeit notes.Complaints pile up on the forum. Orders do not arrive on time, quality suffers and communication with Benjamin becomes patchy. Benjamin stalls for time, promising refunds if the deliveries do not appear, which annoys customers whose money Benjamin has. Benjamin blames the market’s administrative system for problems and asks buyers to contact them directly and pay in bitcoin, triggering another round of criticism as this process gives the buyers no guarantees. The tone of the forum changes. Previous supportive members write long, highly critical posts. Benjamin struggles with justifying the perceived declining quality of the notes and promising improvements. They claim that the loss of quality is a matter of perception, that initial enthusiasm for the notes inflated expectations, and admits to some lower quality notes being shipped due to the influx of new orders limiting their quality control processes. Benjamin is suspended for a time by his supplier for failing to communicate well with their clients, and for not properly prepping the notes before sale, as the supplier begins to worry about the blowback from negative experiences with the notes Benjamin sells.
Benjamin complains about his relationship with the forum and sometimes the supplier, Willy.Clock. There is some suspicion that starting with good stock is a strategy to then switch buyers to less convincing notes. Some buyers acknowledge that they are on the lowest point on the food chain, and are unlikely to be offered supernotes which sell for much more and go to better invested users. Buyers argue with Benjamin and each other about the work they needed to do to the notes to make them look and feel more plausible.
I also went and just tried to play around with a note myself and I sprayed it with acrylic matte spray after putting it in water and drying it off and pressed it in the pages of a book and put a table leg on that. Now it’s fantastic! If the paper is good the rest of the note is great!!
Narrative closure: Benjamin in response goes on sabbatical in order to address the problems with the notes that buyers have identified, returning with what are claimed as notes that pass the pen test and feel close to the real thing. Enthusiasm resumes as these notes are distributed. As this wave of enthusiasm builds, the supplier is arrested, bringing the thread to an end.
Now about the context, the forum is a social space: Benjamin enjoys support from thread participants who advise on fine tuning note design and use. Benjamin had a number of buyers who were very positive about the product. As problems emerged they were accused of being sock puppet accounts. These acolytes proposed that if people were finding problems getting the notes accepted they were doing it wrong. They were following the wrong strategy, or were inherently suspicious individuals who invited greater scrutiny. Benjamin endorses these readings. Although one can never be sure, it did appear that these were genuine accounts who had made purchases through the system. Tell us why we now need to know about crime scripts: The business logic required a supporting chorus of satisfied buyers who could validate the quality of the notes and how they were used, in the form of a shared crime script.
Using the crime script
Start with a basic taxonomy: Participants had various roles: structuring, supporting, guiding, questioning, and various degrees of investment in Benjamin’s success. Some were highly critical of the entire process and said that passing of fake currency was only good for people who could not make it as drug dealers. Others saw their role as validating the genuineness of Benjamin’s efforts. One user, thisoldman, became critical in guiding buyers through the crime script, and users reported success with guidance from them. Thisoldman offered a guide for purchase to passing notes which could be bought through the site. They passed out tips on how to improve the passability of the notes by altering their appearance and feel.
The two separate scripts for Benjamin and their customers are set out side by side in Table 1. There was more information on the customers’ script as they participated much more in the discussion which involved troubleshooting their use of the notes. I have included both as they both centre around the forum in different ways. The forum was crucial to both scripts in different ways.
Table 1 Crime Script
Benjamin
Buyer
Entry
Set up cryptomarket account
Target scoping
Precondition
Bulk order from supplier
Reputation
Receive currency
Choose high traffic setting
Work notes
Selection
Market/sales/advertise
Select/stealth person/car
Select young cashier/busy time
Instrumental initiation
Receive orders from buyers
Pricing and divide up note ‘packs’
Identify high value/good return good
Instrumental actualisation
Process orders, select consumer/delivery
Buy goods/swap out cash
Continuation
After sales support/manage reputation/expectations on forum
Recycle bad product into good notes
Post condition
Close the feedback loop with supplier
Transfer legit cash
Exit/reset
Cash out/repost
Return to thread/leave
Showing there is more than a technical function/aptitude needed: From the point of view of Benjamin, creating a plausible cryptomarket identity was the first technical step. Then they needed to satisfy two reputational requirements. They needed to be in good standing with their supplier in order to secure a large enough order of notes to make redistribution profitable, and to appear both plausible and reliable to the users of the crytpomarket. Buyers were taking a risk buying the notes as they had little recourse if they turned out to be unusable. Throughout the process Benjamin had to calibrate their expectations of what they have, do the technical work of processing and sending orders, review users experience in the forum, send feedback to the supplier and cash out. Engagement with the forum was needed to manage the customer base and keep them involved:
My supplier has just informed me that a rather LARGE shipment is in DHL processing now, and should be coming out of customs shortly. Keep your fingers crossed people!”,,
A notable aspect of this was Benjamin’s willingness to expose their own process. A key instrumental precondition was prepping and batching notes for distribution and Benjamin wrote often about the process of preparing the notes, showing how the process might go wrong and acknowledging the uncertanties:
It means that MrMouse and I among other retailers are having to treat notes ourselves with makeshift methods from the boss, and we aren’t artists like Willy, so we struggle. We don’t have access to the chemicals that Willy does on his end for proper treatment. We get the job done (as in your notes will definitely pass the pen test), but recouping the pure authentic feel has been a challenge.
Closing the feedback loop with the supplier was necessary to continue the script. Benjamin had to give feedback to Willy.Clock and inform the forum of how the notes were changing in response.
Benjamin and some key contributors maintained a modus operandi document, effectively their own literal crime script, to guide users through the process. The document involved ensuring users did not try too high and invite suspicion, for example, by buying a one dollar item with a one hundred dollar note.
Showing how the findings are structured: The relationship between Benjamin and their buyers was one where Benjamin acted as an avatar for the notes. From the point of view of the user the central elements of the process were identifying a point to swap out fake notes for real ones, turn the counterfeit into goods that can be used or returned for cash or otherwise realise real money from the fake notes. That could involve working with an insider at a bank or a retail outlet where there would be considerable cash flow. Most contributors however used them at retail level by selecting a plausible target and time of day to buy small value items with a large note. Users selected targets according to their judgment on whether the note would be accepted. Some split targets by denomination, using $20s and $50s in busy outlets, or buying more $100s when they were confident the note quality and the target merited it. In their discussion the buyers mentioned how they slipped the counterfeits into the supply chain. Their varied tactics were aimed at laundering bad notes into good. Buying a small value item with $50 or $100 notes and obtaining change would do that. However there was a risk that cashiers would be more likely to scrutinise or refuse large value notes for small value items. Another route to actualisation was buying easily cashable tokens such as money cards.
A labour structure was in evidence in some cases. Most buyers used the notes as individuals. One buyer claimed to be running a larger operation with a team who would spend the notes. There was a sense that these were not major players and would be buying small amounts to use in ways that would not attract attention.
They discussed various failures and how to exit the scene after notes were rejected. None reported the police being called in response to an attempt to use fake notes.
Give a feel for the process: A skill promoted was the ability to work the notes into a consistent product, using the inevitably variable supply provided by Benjamin to produce something consistently workable:
My only issue now is that this batch was different then the last one, not because of quality but because Ink clearly did something wrong to the paper, personally I shut the fuck up and just fixed it myself by putting them in water like I said before, but some people just think they should get supernotes in the mail and not have to touch anything because they are really petty customers, so in your best interest Ink we think you should fix
Linking both ends together: Material skills were in evidence. Working the notes showed how the physical qualities of the notes were seen as features that had to be enacted in practice, through a combination of the ability of the buyer to work the notes into plausible currency, select the right target and approach in the right way. The combination of technique and technology came together to enact the counterfeit currency as a technology applied to a specific situation. In that sense the currency is only enacted in place.
Discussion
Remind the reader of the context: Distribution of counterfeit currency in this way is an example of a hybrid crime combining online distribution of the product and offline implementation of the crime, actually using the notes in a fraudulent way. The script required understanding the meta-criminal context in which Benjamin and the users operated. Benjamin was a secondary vendor for a primary note producer. Therefore they had to manage both their supply and manage expectations within the darknet community about the effectiveness of the notes. Benjamin’s second stage role meant they could palm off some of the responsibility for poor quality product onto the supplier but still needed to maintain a reasonably high hit rate among their customers. It was vital in order to keep selling the notes that users reported success with them. This is not an unusual element of digital crime. Some organisations have guides and helplines for both associates and victims in order to ensure the script goes smoothly, allowing for negation between victim and offender (Hernandez-Castro, Cartwright, and Stepanova 2017). A further analysis is invited which treats the counterfeit notes as part of a criminal assemblage. In this perspective the discourse around it, the production and distribution system, is part of a set of practices that produce the product as a workable entity.
Fit it into the literature: Though cryptomarkets focus on drug distribution some attempt to branch out into sales of weapons, counterfeit cigarettes and other goods such as counterfeit currency. This example shows that the system can be adapted so that the cryptomarket takes over the last mile of counterfeit distribution, and also the problems adapting the cryptomarket verification and quality control systems to a very different product. The community had great difficulty verifying the quality of the notes and had a single point of failure in the person of Benjamin, making it much less resilient than the section of the cryptomarket dealing in illicit drugs.
Size the issue: Overall the counterfeit trade in the cryptomarkets is fragile compared to the drug trade, as many participants recognised in their discussions. Another reason for the lack of resilience was the limited profit to be gained. Notes sell for 50% of face value. Therefore most profit is made in the production/distribution phases. When users take into account risk and the expense of crime commission the likely profit is much less than the theoretical profit of using counterfeit notes. Profits are further reduced if the user needs to employ others and share profits as part of their business model.
Talking about limits shows how the findings can be adapted in other contexts: The context limits some inferences that can be drawn. Participants do not disclose their country of operation. The darknet can be accessed from many countries, though it is difficult to access it from China. Data show most darknet use takes place in European, North America and Australia and the language/tone of the participants indicate they are based in the USA. References to the Federal Reserve and the fact they are using dollars in retail transactions indicates they are American. What is missing? There are a number of dark players in the cryptomarkets. The administrators and moderators govern who gets to create an account. They can ban accounts though a persistent hostile user can easily recreate another. Benjamin’s crime script is oriented towards his or her actions in the forum and there is a missing part to it, their relationship with their supplier.
What’s new/different? The cryptomarket provides a space for discussion and a hub for distribution. The counterfeit vendors/users employ an adaptable crime script. There is more variation in the buyers’ script. Benjamin’s script is constrained by the quality of the product available and the willingness of the buyers to pay for and use it. To an extent the group as a whole worked on developing their crime script through comparing different experiences with using the notes, their opinions on their technical qualities, and advice about how to successfully use them without being detected. In this way what mattered to them became apparent. The technical qualities of the notes were a means to an end: their ability to use them successfully and then use the knowledge gained to buy more. Successful repeat use was vital in order to make any kind of return, which was why consistent supply was so important to them. New context: insertion of market forum into crime script development and adaption. Discussion forums are critical in criminal evolution and innovation and we can also include other media such as Telegram channels in this. Users hybridise different modes to produce a workable modus operandi.
Why technology matters in one sense: The forum has certain technological affordances that matter. It is an example of a self-generated hierarchy. Why technology matters in another sense, and why we need to modify what we understand by crimetech: the notes have to be worked in different stages to make them plausible to different audiences, from the buyer to the target. That goes from batching to distribution, prepared for use and then distributed. Both Benjamin and the buyers treated the notes they received. Crime is embodied as craft work, recognising the personal, emotional labour that has to be involved in crime commission.
Finesse existing theory: The organisational context and the character of the criminal relationship is quite limited as Bejnamin has no control over the buyers so this relationship is voluntary. In comparison money mules are sometimes coerced through threats or debt relationships [ref]. The character of the crime is one of mutual exchange. It can be understood in terms of an dapted rational choice theory, but with added recognition of positionality/identity as motivating factors, materiality. Both vendor and buyer morally orient themselves to each other and the crime itself. ‘Rational’ is often drawn narrowly in terms of interests and should include the person’s identification of their own moral positioning in relation to the criminal activity, their motivation.
What can I infer? Both Ink and the buyers engage in innovation and fine tuning of their crime scripts. For Ink, reputation management and playing the role of the vendor willing to learn and respond to their critics is a key part of maintaining their status. For the buyers, they discuss how to successfully make use of the currency, avoid incurring legal liability while adapting to potential surveillance conditions.
Conclusion
What are the consequences of this paper (and I’d better rethink the title now): I have argued that understanding the crime script in this context is something supported by the community as a social organization and also as a material structure enacted through craft practices. As a consequence, intervention might consider taking place at the level of craft labour. There is a great degree of tacit knowledge involved in criminal enterprises. Crime script analysis tends to focus on the technical steps which foregrounds a rational choice approach when it comes to attacking the incentive structure. This analysis shows how reputation and plausibility are crucial elements at different stages, and the labour needed to achieve them.
Acknowledgements
For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising from this submission.
References
Bank of England. 2022. ‘Counterfeit Banknotes’. Retrieved 7 June 2022 (https://www.bankofengland.co.uk/banknotes/counterfeit-banknotes).
Barratt, Monica J., and Judith Aldridge. 2016. ‘Everything You Always Wanted to Know about Drug Cryptomarkets* (*but Were Afraid to Ask)’. International Journal of Drug Policy 35:1–6. doi: 10.1016/j.drugpo.2016.07.005.
Board of Governors of the Federal Reserve. 2021. The Fed – Money Stock Measures – H.6 Release – December 28, 2021. Washington, D.C.: The Federal Reserve Board of Governors in Washington DC.
Chainey, Spencer P., and Arantza Alonso Berbotto. 2021. ‘A Structured Methodical Process for Populating a Crime Script of Organized Crime Activity Using OSINT’. Trends in Organized Crime. doi: 10.1007/s12117-021-09428-9.
Chant, John F. 2004. ‘The Canadian Experience with Counterfeiting’. 14.
Childs, Andrew, Ross Coomber, Melissa Bull, and Monica J. Barratt. 2020. ‘Evolving and Diversifying Selling Practices on Drug Cryptomarkets: An Exploration of Off-Platform “Direct Dealing”’. Journal of Drug Issues 50(2):173–90. doi: 10.1177/0022042619897425.
Dehghanniri, Hashem, and Hervé Borrion. 2016. ‘Toward a More Structured Crime Scripting Method’. Pp. 94–97 in 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).
Dittus, Martin, Joss Wright, and Mark Graham. 2017. ‘Platform Criminalism: The “Last-Mile” Geography of the Darknet Market Supply Chain’. Pp. 277–86 in WWW ’18: Proceedings of the 2018 World Wide Web Conference. Geneva: International World Wide Web Conferences Steering Committee.
European Central Bank. 2021. ‘Euro Banknote Counterfeiting at Historically Low Level in 2020’.
Felson, Marcus. 2006. ‘THE ECOSYSTEM FOR ORGANIZED CRIME’. P. 20 in HEUNI 25th Anniversary Lecture. Helsinki.
Felson, Marcus. 2009. ‘The Natural History of Extended Co-Offending’. Trends in Organized Crime 12(2):159–65. doi: 10.1007/s12117-008-9056-7.
Hayward, Keith. 2007. ‘Situational Crime Prevention and Its Discontents: Rational Choice Theory versus the “Culture of Now”’. Social Policy & Administration 41(3):232–50. doi: 10.1111/j.1467-9515.2007.00550.x.
Hernandez-Castro, Julio, Edward Cartwright, and Anna Stepanova. 2017. ‘Economic Analysis of Ransomware’. ArXiv:1703.06660 [Cs].
Holt, Thomas J., and Jin R. Lee. 2020. ‘A Crime Script Analysis of Counterfeit Identity Document Procurement Online’. Deviant Behavior 1–18. doi: 10.1080/01639625.2020.1825915.
Judson, Ruth, and Richard Porter. 2003. Estimating the Worldwide Volume of Counterfeit U.S. Currency: Data and Extrapolation. Washington, D.C.: Division of Monetary Affairs Board of Governors of the Federal Reserve System.
Kahn, Charles M., and William Roberds. 2008. ‘Credit and Identity Theft’. Journal of Monetary Economics 55(2):251–64.
Krebs. 2014. ‘Fun With Funny Money – Krebs on Security’. Retrieved 27 January 2022 (https://krebsonsecurity.com/2014/09/fun-with-funny-money/).
Lemon, Alaina. 1998. ‘“Your Eyes Are Green like Dollars”: Counterfeit Cash, National Substance, and Currency Apartheid in 1990s Russia’. Cultural Anthropology 13(1):22–55. doi: 10.1525/can.1998.13.1.22.
Li, Yiting, and Guillaume Rocheteau. 2011. ‘On the Threat of Counterfeiting’. Macroeconomic Dynamics 15(S1):10–41.
Lupo-Pasini, Federico. 2021. ‘Financial Inclusion and the “War for Cash”’. Law and Contemporary Problems 84(1):17–34.
Reserve Bank of India. 2019. Annual Report 2019. Delhi.
Reserve Bank of India. 2022. Annual Report 2022.
Tompson, Lisa, and Spencer Chainey. 2011. ‘Profiling Illegal Waste Activity: Using Crime Scripts as a Data Collection and Analytical Strategy’. European Journal on Criminal Policy and Research 17(3):179–201. doi: http://dx.doi.org/10.1007/s10610-011-9146-y.
Van Nguyen, Trong. 2021. ‘The Modus Operandi of Transnational Computer Fraud: A Crime Script Analysis in Vietnam’. Trends in Organized Crime 1–22. doi: 10.1007/s12117-021-09422-1.
Wang, Yujie. 2020. ‘Effect of Demonetization on India’s Financial Sector’. Pp. 308–11 in. Atlantis Press.
Is crime in competition with being law abiding? For rational choice theorists the answer is mostly yes. The decision to commit crime is a calculated judgement based on self interest. There is nothing particularly special about criminals or crime. In contrast both deviance theory and bio-psychological criminology say there is something distinct about both. Bio-psychological theories examine criminal motive in terms of personal development traits: how do criminals depart from the normal. No need to explain the costs of compliance. Deviance or cultural criminology also says crime could be attractive in itself, as a separate state of transgression. Katz (1988) identified the thrill of deviance in immediate acquisitive crimes like shoplifting and Goldsmith and Wall (2022) highlight the life stage attractions of some types of cyber scalliness.
I am attracted to this approach but slightly wary of the background assumption that thrills are what characterises these types of crime. Apparently thrill seeking crimes might provide emotional satisfaction in other ways. Some apparently thrill seeking crimes require working at and cooperation. We can understand more about behaviour such as trolling through the attractions of cooperation to attack a target. This is all good but sets us up for a hypothesis. As crime is becoming more rationalised, are these seductions lost. If the controller of your shoplifting gang is expecting you to turn round £1000 of shoplifted goods a day, the motivation and experience is likely to be very different from thrill driven shoplifting.
Given how organised and systematised shoplifting is now we can hypothesise that the attraction of transgression is less significant as a motive. Shoplifting becomes more like the piece work that was the labour process in early modern factories, organised in labour gangs that were often also kinship groups. We also should change our understanding of what gangs are. These gangs are more mobile and adaptable, and less focused on territory, than the classic modern and post-industrial gang that characterised criminal life in Glasgow, Los Angeles and other places.
Goldsmith A and Wall DS (2022) The seductions of cybercrime: Adolescence and the thrills of digital transgression. European Journal of Criminology 19(1). SAGE Publications: 98–117. DOI: 10.1177/1477370819887305.
Katz J (1988) Seductions Of Crime: Moral And Sensual Attractions In Doing Evil. New York: Basic Books.
There is a spike in exports of household white goods and consumer electornics to former Soviet Central Asia and the neighbourhood. Why is that? The assumption is they are headed by hook and by crook to Russia. What for? It is claimed they are needed for the war. There is something in them Russia needs. Metal for MiGs? Batteries for the drones? Neither. Semiconductors are in desparate need as the war machine expends its guided missles and drones over Ukraine. Russia is importing washing machines, refrigerators and other items via places like Kazakhstan in order to get their mitts on the microchips. I was interested in this example of a rapidly emerging illicit trade.
It is a nice story about an everyday item suddenly becoming vital due to the bitter war. But as reporting by Tegler shows, not likely not to be true, or if true, not very significant. Drones, missiles and other items being expended in the war create a thirst for microchips. However the kind of chips you get in household items are not critical to these weapons, and though they are useful they are of a kind that is widely available. Higher imports might just be due to good old fashioned need, as domestic industry is throttled or forced to turn to war production. There is however a trade in far more useful microchips being washed through third countries. China is likely a big supplier.
What sanctions have done is highlighted how so many aspects of life in a modern economy rely on microchips. Want to shift to a non-Western payment system? You will need lots and lots of microhips. So household appliances are vital to the war because households rely on them, not because they are a form of secondary war production.
It is difficult to understand the appeal of Ardern, Sturgeon, Trump and Johnson without recognising that politics is about providing psychological goods: the warm bath of a seratonin hit, with the odd excitement of a dopamine rush to break it up now and then. Western politicians have given up on fixing our declining productivity or taming capitalism. They now hope to provide reassuring narratives and national psychodramas. The language displays that. Commentary over Nicola Sturgeon’s rule mentioned how reassuring her presence was during COVID, and how pleasant her social democratic narrative was, while not pointing to any actual real world impact her policies had. Criticism of Trump during the same period tended to focus on his unwillingness to be reassuring in those terms. He is more on the dopamine based continuum I feel. It is not that Sturgeon had no policies, just that they exist purely as props in the psychological narrative being offered. Something she was very accomplished at. Opposition parties’ attempts to point to this or that inadequacy in policy delivery missed the point.
Security experts cal this ‘security theatre’, measures which have a relatively low immediate cost and which induce the sense of safety in the target without any measurable effect on actual safety. For example, the US TSA introduced strict checks on air passengers following the attacks on 11th September 2001. These measures had high externalities, and so put off passengers from travelling by air they had a measurable effect on road traffic accidents. The characteristic of security theatre measures is that their proponents refuse to factor in externalities and opportunity costs. They sometimes directly increase insecurity as to avoid too many false positives their operators hack them.
Security theatre is not a bad aim in itself. Sometimes trust has to be demonstrated and it might be as important to show people they are safer as much as making them actually safer. Politically it may be necessary to reassure high value clients so they have a sense that ‘something is being done’. Interface design embeds that. People take friendlier safety theatrics over alienating security reality any day. There are also significant problems stemming from people’s misperception of risk or safety. Fear of crime can be debilitating, isolating and wearing. A little risk is a good thing, for an individual and society.
Security in life and in politics creates a safety bubble (the serotonin bit) but also needs a hard, thrilling edge to show how miserable and dangerous life is outside (the dopamine bit). Also known as ‘England’, for viewers in Scotland. So what? One of the reasons we have such a strong focus on narrative in politics is that there are social facts which are unavoidable but nobody has the will or desire to do anything about. Number one is that inequality tends to increase, absent war or revolution. Narrative is a cheap-ish way of softening the edges and a good way of convincing the middle class that the state spending they benefit from is good in principle as well as happily coincident with their interests. On a micro-level, social media is designed around dopamine, providing the happy little hits that drive interaction and turning us all into a ore to be deep mined.
What to do? Realty always comes a-knockin’ of course, but it takes its time. The main problem is that by design our political system gives politicians very little to actually do. Decisions are farmed out to abstract entities or contracted companies and arms length agencies. There is no real fix for that. Maybe we could make all children raised by wolves, as most Boomers claim to have been.
A research review is a summary, evaluation and critique of a book or other work, like a report or a collection of research articles. Its purpose is to comment on the state of knowledge on a topic and/or to evaluate a particular theory or contribution. The first task you have is to define what it is you are looking at. A book in academic terms is a very different text than a report. They are produced for different aims and audiences. A book review is the most common format, and that is why I am leading with that.
Writing a book review
A book review is your take on the book’s contribution. It shows how the book fits into an existing narrative or debate, stakes out new ground, and moves our understanding forward. There are two approaches you can take: the first a conventional review largely contained within the territory the book itself stakes out. The second is a review essay which sets the book in a wider context.
Each approach draws on similar questions, which I have set out below. Each question asks you to assess the book’s contribution to the theoretical or research problem it is part of. Depending on your approach the balance will change between them. For example, if you were reviewing the memoir Spare you would not just summarise what it says but ask what it tells you about monarchy, and about how insiders write about it. How is the book’s perspective both enhanced and limited by that? What effect does it have? How does it shape our public discourse about monarchy in general and the British royal family in particular? You would also want to assess how it achieves its aims. Is the writing convincing? Does it reveal more about the author than he intended? How does it fit into a particular idiom? A book is always part of a bigger project or discourse, is more than itself.
How do you start a book review? Reading the book might be a good way to go. But a book is very big. You want to begin with a reading template, a set of keywords or concepts you will look for in the book. Identify themes you will look out for, keywords that trigger your interest. As you read, note points you want to return to to clarify or check against later claims. If the book sets out hypotheses early on, then see that they are met later on. Develop a reading template, a plan of points to look for in the book. For example, for the book Rahman M (2019) Homicide and Organised Crime: Ethnographic Narratives of Serious Violence in the Criminal Underworld I have prompted you to look for what it has to say about masculinity and habitus, so look for where he discusses those themes, note down both what he has to say and how he says it. Note the contexts he refers to and the kinds of masculinity and habitus in evidence. You can show how these concepts connect to each other. How might different ideas of masculinity relate to each other and to violence?
Another template you could use is to categorise the types of narrative the book uses. Some books are very narrative driven, and others let the argument flow through the evidence. In an academic book not all the content has the same purpose. Some of the writing establishes the authors’ bona fides, while other sections demonstrate and elaborate on their argument. The questions I have set are to help you do this, to give you points to look for throughout.
When writing it, ensure you cover these points:
Start out with a bit about the author or authors
Say who they are. Look at their Google Scholar profile. Have they written other books or papers on this topic? Are they known for taking a certain angle? Do they belong to a theoretical school that shapes what they say? Often they will say this in the introduction.
If you are taking the book review essay approach you will want to highlight the problem or question the book tackles more than what the book itself claims.
Summarise the book.
A book is written with a purpose so start by stating what that is. What are its aims and agenda? What is it trying to say? What is it aiming to do? What problem does it want to solve? What evidence is it producing, if any? Some books aim to be theoretical or thought leader contributions. They want to shape the debate on this topic and set an agenda. They say what should be. Others are reporting on research projects and so are more like a statement of what is, and what matters. How is the book structured? Depending on how you want to write the review, you might spend more or less on this part.
Situate the book.
Each book is part of a bigger conversation happening in its field. Usually you will know this because it will tell you a lot. What kinds of debates is it influence, what problems is it addressing? Find who else has intervened in this debate and from what perspectives. Is the author arguing against them? Books usually comment a lot on existing research and you might want to say how effectively they have done that.
Evaluate the book.
Say what you liked about it. How did you feel while reading it? What does it contribute, what are its strengths and weakness. Does it meet the challenges it sets? Look at how it gathers and uses evidence. Are there limits there? Think of common strengths – a wide selection of cases and a desire to look for evidential counterpoints shows a willingness to disagree and reflect. It makes for a more resilient set of findings. Limited case selection might indicate limits to the argument. Make a critical reading of the text. Authors often use terms inconsistently, to mean different things at different times, which can make the meaning hard to pin down, but illuminating.
For instance, a book that examines masculinity and crime: does it define masculinity in terms you are convinced by? Is it consistent? Does it understand how masculinity evolves sociologically? How is the term applied in relation to the empirical evidence it uses? Let us say the study is looking for manifestations of masculinity, are you convinced by how it does that? Use other framings you have come across in the course. If discussing organised crime, does it rely on police definitions of what organised crime is? Outline the limits of doing that.
Say what concepts are being used incidentally but need to be thought through. Gangs is one we see often in the research. The concept has a lot of assumptions build in as to what gangs are, who belongs to them and how they function. The book index is useful here.
How does the author know what they claim to. What sources of evidence are being used and how should they be evaluated? What are the limits of Rahman’s ‘dashcam ethnography’ for example?
Was there anything you did not like? Did you feel the book addressed you well as a reader? Is there anything missing from its agenda or approach?
When reading the book be guided by your response to it. You will respond to any academic text intellectually and emotionally, and in my view we cannot separate those elements. How you read the book matters as much as what it says, and what it says to you matters as much as what it says to the topic of criminology or whatever it might be. Your response is a valid good guide to what it is saying – are there parts that are intriguing, or recognisable, or captivating, or alienating? Did anything make you laugh? Always say why that was.
Look ahead
A good way to end is to suggest where we might go from here. Is it worth pursuing the agenda they lay out and what might be needed to do that?
Reviewing a report
Reviewing a report such as a document published by Europol is different from a book because of the way in which it is written and the purpose for which it is written. A report like one of Europol’s threat assessments serves several functions. It is a statement of the organisation’s purpose and a justification for its existence and strategy. In the case of Europol it is a political document, in the sense that it seeks to influence the aims and strategy of members. It is a case for action. Reports can also serve other functions. A report on past investigations might say ‘this is how things should be done. This is the best way of doing them.’ It might explicitly identify problems to be fixed.
A report is an institutional document, unlike a book, which is a personal document. Therefore, when reviewing a report, you would want to say why it was being written, and for what purpose. What function of the institution is being served by this report? In one sense, a report is also saying something about what the institution is as well as what the problem. In one sense, a report is also saying something about what the institution is as well as what the problem or challenge is. If you know the work of if you know the work of Weber on bureaucracies and how they act you will be very familiar with this idea. It is not too conspiratorial to assess that anything produced by bureaucracy is in some way going to be justifying the bureaucracy’s existence or purpose.
That does not mean it is without value. It does mean that there are going to be other takes on the issue which might might not be represented in the report. Do you have a way of finding those out or representing them? Also, consider the audience. A report like those produced by Europol is not going to spend a lot of time discussing the produced by Europol is not going to spend a lot of time discussing the ins and outs of different definitions of organised crime. It will say a lot more about it is it is and what we should be worried about.
You will find that reports present evidence in a very different way to an academic book or article. Academics talk a lot about how we arrived at our conclusions, reports are focused much more on what the conclusions are. Academics should present the evidence in a way that allows you to reach your own conclusions. Reports often do not do that. You can see that at work in reports by activist groups which are often highly selective and need to be read with a critical eye.
The value of social research methods is that it produces independent evidence on the nature of society, social-economic problems and challenges, and potentially agreed ways of reaching effective solutions. There are two challenges to social research methods: one is the epistemic fracture of societies, where awkward evidence is mistrusted or denied. The other is the technocratic assumption that all will be resolved by data, and that theory-less, structure-less, data will answer all questions. These are challenges are all the more serious because they have something to them. Social research, like any other institutional practice, can be governed by agendas that are hidden or unquestioned, or partial. Much effective research takes place outside of institutions, and platform data provides more data than we can seriously use without developing our computational skills and tools.
We have to get these challenges in context first of all. Despite the image of an atomised, divided country living solely on the warmth of social media rage, people in Britain are fairly trusting. They just do not trust central government that much. There is epistemic fracture though. Trust in established new sources is not strong across the board and has exhibited a growing vertical and horizontal epistemic fracture. There are many features to this epistemic fracture, showing the evolution of public debate and the social sorting of society into a self referential, credentialed class and the rest.
One that has gathered a lot of interest has been the operation of malicious disinformation operations. Thomas Rid (2020) has written an accessible history and theoretical study of information operations. As he shows overall disinformation operations are about the intent, rather than the form, of the operation. For that reason tactical moves like disclosing a campaign’s existence can be effective if the aim is to generate uncertainty. According to Rid (2020) what they do is attack the liberal epistemic order. This order has some features: that facts have their own life, independent of values and interests: that expertise should be independent of immediate political and strategic interest.
That institutions should be built around those principles – a relatively impartial media, quiescent trade unions, universities, even churches and other private institutions, are part of the epistemic matrix undergirding liberalism. It doesn’t take a genius to work out that this order has been eroded from multiple angles over the past decades by processes that have nothing to do with information operations. Independent media institutions like established newspapers have become uneconomic and replaced with a click-driven, rage fuelled, tribalist media. Increasingly the old institutions mimic the new. The independence universities and the professions has been similarly eroded by the imposition of market driven governance on higher education, the NHS, and other bodies. This isn’t a call to all just get along because that is part of the problem: we are not grasping the power of vertical integration of self, context and information spheres. Disinformation can be a red herring and an excuse for the failure of institutions to operate in the public interest, and to understand why this is the case.
The horizontal aspect of this is that people with high social and economic capital have more trust in institutions. The vertical aspect is that in some societies trust is politically divided and people only trust news sources that represent their ‘side’. These two dimensions overlay each other. We should not be too surprised. People whose lives were easily adapted to COVID lockdown because they had secure housing, could work from home easily, and did not have their children’s education much disrupted are more trusting of institutions and establishment media sources. This aspect of epistemic fracture was hidden from sight, and instead mistrust in COVID messaging was often attributed to disinformation and malicious actors. There are plenty of disinformation operations but their effectiveness is questionable. Social research should provide a framework to move beyond panicked responses that seek to close down the public sphere.
Historical research and media analysis also helps us put these problems in context. It also does not take a genius to note that the liberal epistemic order was always less than it was cracked up to be, as studied in the work of the Glasgow University Media Group among others. If we look at the history of trade union politics in France and Italy to take two cases we see a fractured information order without a public square consensus.
We can use critical digital analysis to point to some specific developments more recently: the financialisation and datafication of disinformation markets, and the vertical integration of political power with distributed media which makes use of of a distributed labour infrastructure which is agile and available. It is noticeable that they use some of the same infrastructure of doubt and uncertainty which is employed by spam and ransomware operations. They deploy sophisticated, data informed semiotic tools. The recent history of disinformation strikes at a number of question at the intersection of information science, sociology of markets, sociology of technology and the philosophy of knowledge: how can disinformation be defined, recognised and how can systems be made resilient against it. There are several thorny ontological and epistemological questions e.g. between the politics of knowledge, preference falsification, technical and social verification.
One way of doing that is to reframe the issue in a way supported by social research methods. It cannot be about pure information (no such thing) or uncontested knowledge (undesirable) but creating local, critical spaces where communities can decide on the informational priorities that matter to them. Returning to my starting point, we need to understand an epistemic contradiction: the most liberal viewpoints demand the most closure when they attempt to grasp the motives of others. People who voted for Britain leaving the EU have a much more accurate understanding of the Remain side’s motives than Remainers do of theirs. They are epistemically privileged, if socially marginalised. My hypothesis is that epistemic gap is due to the Remain side having a much more socially integrated multi layered knowledge structure which operates through everyday spaces (work, university, neighbourhood) in ways that the Leave side does not. The reason the EU vote was a surprise to many was that this conceptual integration around Leave is more fragmented, less socially/culturally powerful, but is still there.
What we should establish is the role of social research in the creation of an information moral economy. People who answer surveys, fill in census forms, and put up with us when we interview them or hang out in their spaces, are participating in a moral economic that recognises some civic commonality and public good coming from research. The moral economy is instrumental and emotionally bound, and recognising it means we need to understand our duties towards norms of reciprocity and the public good, the role our work has in vital questions of the distribution of economic and social resources.
Rid T (2020) Active Measures: The Secret History of Disinformation and Political Warfare. Farrar, Straus and Giroux.
Crime is designed in. Organised crime is intertwined in society and its institutions, its character reflects them, and it uses society’s technical affordances. Digital capitalism provides tools to increase the reach and impact of criminal activity Risks are distributed along with social vulnerabilities. Some crime is required and necessary because many people cannot turn to the state for help. If the only source of order is the local gangster, the only source of liquid capital the local loan shark/drug lord, the only way to secure status or survival is through gang membership, if social cohesion relies on gang influence, if social order relies on the underworld, if an economy relies on a supply of illicit labour, if it depends on minerals produced in defiance of environmental regulations, if the most productive and highly capitalised sector of the economy ignores regulatory compliance; if survival depends on it, we can talk of crime as necessary. As an example, the Yakuza have at times been the most flexible and adaptable sector of the Japanese economy.
Technical and social networks are crucial to the development of criminal capacity to organise effectively. Mafia organisations benefit from ‘rents’ (ie charging to non interfere with everyday business) and ‘protection’ (obtaining control over resources, labour and skills, rather than producing those things). Most capitalist activity comes from that. Social media obtains extractive control over personal data. Amazon uses economic privileges awarded by the courts to charge a rent from sellers and book publishers. These aren’t even the nastiest examples.
The capacity to create hybrid systems in terms of state-crime relations, legal-illegal and organisational-platform/infrastructure is central. The infrastructure allows participants to manage and broker risk. On a national and global level state formation and deformation leads to the creation of conflict zones and black spots. At one time criminologists hypothesised that people became labelled as deviant and adopted a deviant identity. Crime existed in the left over grey spaces of the licit world, the abode of the righteous dopefiend. Now, we see crime designed into systems, and crime that creates its own context, its own technology and architecture. As an example, telemarketing fraud practitioners who have entirely no sympathy at all for their victims (Shover, Coffey and Hobbs, 2003). They view themselves as entrepreneurs taking money from the foolish who are complicit in their own victimisation.
There was a parallel between the tele-fraudsters’ own lifestyles and the way they characterise their victims. They saw their victims as reckless gamblers eager to give their own money away. The fraudsters’ own lifestyles often involved high stakes gambling and plenty of splashing the cash, so they seemed to think that their victims wanted to be like them but couldn’t. Those running the tele business engaged in the usual distancing involved in white-collar crime. Those who ran the business blamed their salesmen for going too far. Salesmen blamed their bosses for giving them incentives to illegal behaviour. The fraudsters thought they merited a lavish lifestyle but were unable to obtain it by mainstream means. Telefraud offered them large amounts of ready cash for little expenditure of effort. There is nothing these convicted criminals say or do that wouldn’t fit very well with a company operating legally but at the margins of personal morality. They rely on the same systems, the same data, the same language.
Ruggiero V (2013) The Crimes of the Economy: A Criminological Analysis of Economic Thought. London: Routledge. DOI: 10.4324/9780203385500.
Shover N, Coffey GS and Hobbs D (2003) Crime on the Line. Telemarketing and the Changing Nature of Professional Crime. The British Journal of Criminology 43: 489.
You know that bit at the end of your dissertation or research paper where you suggest what could be done next, and which is always the last thing everyone writes and which you give less thought to than a status update on Insta? You are doing it wrong. Typically these sections are either written in Fantasy Project style, imagining some other study that is not going to happen, or Fill in the Blanks, suggesting some tweaks to sampling or doing more of what you had done. Stop doing that. Nobody cares. Do not waste space imagining some new project. You will never do it. Stop pretending you will ever go back and fix the project that is now in the rear view mirror.
Instead, make some plans that are achievable. Identify other datasets that yours can be linked to. This gives you opportunities for further writing, looking at how your data correlates to another context. The aim is to show how your findings could work with others and how they feed into a macro context which meshes with data, theory and findings from other projects. Ask how your data works with other data types. How would your hypothesis play out in other contexts. How consistent would it be in other cases. How should it be tested against new data.
As an example, we have sorted cybercrime groupings on two dimensions, closed/open in terms of how porous their external boundaries are, and status driven/pecuniary in terms of their motive and business model. A Russian cybercrime grouping is closed and pecuniary within limits. It acts in the interests of the Russian state at times, seeking political legitimacy and in group status. Where might cybercrime groups yet to be brought into being sit and why? Would identity or language based groupings cluster at one end or another? Could it be applied to cases in the UNODC Sherloc database? What new hypotheses could be generated? What might we expect of Islamist or right wing terrorism, or the relationship between cyberwar and state conflict? One advantage is that you can take risks within the bounds of plausibility. The further work should be a genuine map ahead for you which takes you to new places, so think in terms of the possibilities it offers for new thinking and collaboration.