Hypothesis: The Expansion of Fraud is Only Limited by the Availability of Trained Criminals
The Expansion of Fraud: Is It Limited Only by the Availability of Trained Criminals?
Criminology – A SCARS Institute Analysis
Author:
• Tim McGuinness, Ph.D., DFin, MCPO, MAnth – Anthropologist, Scientist, Director of the Society of Citizens Against Relationship Scams Inc.
Article Abstract
The expansion of fraud is increasingly viewed as being constrained not by opportunities or resources but by the availability of trained individuals capable of executing complex schemes. Modern fraud operations demand technical expertise, social engineering skills, financial acumen, and organizational capabilities. Criminal networks, online forums, and insider knowledge serve as key training grounds for fraudsters, enabling them to exploit systemic vulnerabilities.
By targeting these training ecosystems, increasing prosecution rates, enhancing public awareness, and leveraging advanced technologies like AI, authorities and organizations can disrupt fraud networks. Addressing the human element of fraud is essential to mitigating its global impact and safeguarding economies.
The Expansion of Fraud: Is It Limited Only by the Availability of Trained Criminals?
SCARS Institute Hypothesis – The Expansion of Fraud is Only Limited by the Availability of Trained Criminals
Fraud has become one of the most pervasive and adaptive criminal enterprises in the modern world, fueled by technological advancements, globalization, and the increasing interconnectedness of financial systems. Despite the growing sophistication of fraud prevention measures, scams and fraud schemes continue to evolve and proliferate. This raises a provocative hypothesis: is the expansion of fraud constrained not by opportunity or resources but by the availability of trained criminals who can execute these schemes effectively?
Fraud as a Growing Industry
Fraudulent activities generate billions of dollars annually, spanning industries such as finance, e-commerce, healthcare, and telecommunications. From phishing scams to advanced financial fraud, the diversity and scale of these schemes suggest that the opportunities for exploitation are virtually unlimited. However, the execution of these schemes often requires a combination of technical expertise, psychological manipulation skills, and organizational capabilities.
In this context, the hypothesis suggests that the bottleneck to the growth of fraud may not be the opportunities themselves but the human capital required to exploit them. Fraudsters must be equipped with specialized skills to execute complex schemes, and the supply of such individuals may be the key limiting factor.
The Need for Trained Criminals
Executing fraud successfully often demands specific competencies.
Overview
-
- Technical Skills: Many modern fraud schemes rely on advanced technologies such as malware, ransomware, and artificial intelligence. Fraudsters need to understand programming, cybersecurity vulnerabilities, and encryption techniques to develop and deploy these tools.
- Social Engineering Expertise: Scams often depend on the ability to manipulate victims emotionally or cognitively. This requires an understanding of human psychology, persuasive communication skills, and the ability to craft believable narratives.
- Financial Acumen: Financial fraud schemes, such as money laundering or investment scams, require an understanding of financial systems, regulations, and loopholes.
- Operational Coordination: Large-scale fraud operations often function like businesses, requiring leadership, coordination, and resource management. This includes recruiting “money mules,” managing call centers for scam operations and laundering stolen funds.
Technical Skills: The Backbone of Modern Fraud Operations
Modern fraud schemes increasingly depend on advanced technologies to bypass security systems and exploit vulnerabilities. Fraudsters need technical expertise in areas such as software programming, network security, and data encryption to design and deploy tools like malware, phishing campaigns, or ransomware attacks. For example, creating a convincing phishing email requires not only coding skills to mimic legitimate websites but also an understanding of email authentication protocols to avoid detection by spam filters. Furthermore, fraudsters often exploit cybersecurity gaps, leveraging their knowledge to infiltrate systems, steal sensitive data, and launch sophisticated fraud campaigns. Without such technical acumen, many of the most lucrative fraud operations would be impossible to execute.
Social Engineering Expertise: Manipulating Human Psychology
A significant number of scams rely on exploiting human emotions and cognitive biases rather than technological weaknesses. Fraudsters skilled in social engineering can craft scenarios that appeal to their victims’ fears, hopes, or desires, persuading them to act against their better judgment. For instance, romance scams hinge on building a sense of trust and emotional dependency, while tech support scams use fear of computer viruses to coerce victims into granting remote access. These schemes require a deep understanding of human psychology and the ability to adapt communication styles to different targets. Successful fraudsters excel in these skills, allowing them to manipulate their victims with precision and often leaving the targets unaware of the deception until it’s too late.
Financial Acumen: Exploiting Complex Systems
Sophisticated fraud schemes, such as investment scams or money laundering, demand a thorough understanding of financial systems and regulations. Fraudsters must be adept at navigating banking procedures, exploiting regulatory loopholes, and understanding how to obscure the origins of illicit funds. For example, money laundering operations may involve a series of intricate transactions across multiple jurisdictions, using shell companies or cryptocurrency to mask the flow of funds. Without a detailed knowledge of financial instruments and markets, criminals would struggle to sustain these operations. This expertise allows fraudsters to not only execute scams but also evade detection, making financial acumen a critical component of high-level fraud.
Operational Coordination: Running Fraud as a Business
Large-scale fraud operations often mimic legitimate business practices, requiring effective leadership, resource allocation, and team coordination. Just as a business might manage supply chains and customer relationships, fraud syndicates oversee the recruitment of “money mules,” operate call centers for phishing scams, and coordinate the distribution of illicit gains. These operations require a high level of organization and strategic planning. For instance, some call centers in tech support scams involve hundreds of employees working in shifts to target victims worldwide. Fraudsters in leadership roles act as managers, ensuring that each part of the operation runs smoothly. This operational complexity highlights that fraud is not just a crime of opportunity but a sophisticated enterprise requiring skilled management.
Training Grounds for Fraudsters
The skills required for fraud are not innate; they must be acquired. Fraudsters often receive training in specific environments.
Overview
-
- Criminal Networks: Organized crime groups and fraud syndicates often provide training and mentorship to new recruits, passing down knowledge and best practices.
- Online Communities: The dark web and other online forums serve as hubs where fraudsters can share tools, techniques, and advice. Tutorials, guides, and even “fraud as a service” offerings lower the barrier to entry for aspiring criminals.
- Work Experience: Some fraudsters gain their skills while working in legitimate industries, such as cybersecurity, IT, or finance, before turning to crime. Insider knowledge can be invaluable for exploiting vulnerabilities.
- Trial and Error: For lower-level scams, fraudsters often learn through experimentation, refining their techniques based on what works and what doesn’t.
Criminal Networks: The Apprenticeship of Fraud
Organized crime groups often serve as training hubs for aspiring fraudsters, offering mentorship and access to resources. Recruits learn the tricks of the trade from seasoned criminals, gaining hands-on experience in carrying out fraud schemes. These networks provide a controlled environment where newcomers can practice their skills under the guidance of experienced mentors. For example, ransomware groups often operate as hierarchical organizations, with experienced developers creating malware while junior members execute distribution strategies. Such training ensures that knowledge is passed down, perpetuating the cycle of criminal activity and maintaining a steady supply of skilled fraudsters.
Online Communities: The Dark Web as a Fraud University
The internet has revolutionized the way fraudsters learn and share knowledge. Online forums, particularly on the dark web, offer a treasure trove of resources for aspiring criminals. These platforms host tutorials, downloadable tools, and even marketplaces where fraudsters can buy stolen data or fake credentials. Generative AI tools have made it easier than ever for scammers to access high-quality resources, such as realistic email templates or deepfake videos, which enhance their schemes. By participating in these communities, fraudsters gain access to a global network of expertise, accelerating their learning curve and enabling them to launch more sophisticated scams.
Work Experience: From Legitimate Careers to Fraud
Many fraudsters acquire their skills through legitimate careers in industries such as IT, cybersecurity, or finance before turning to crime. Insider knowledge of corporate systems and protocols gives them a significant advantage when designing schemes. For instance, a former cybersecurity professional may know how to bypass firewalls or exploit unpatched software vulnerabilities. Similarly, individuals with financial expertise might understand how to structure fraudulent investments or manipulate accounting systems. This background not only provides the technical skills needed for fraud but also insights into how legitimate organizations operate, making it easier to exploit their weaknesses.
Trial and Error: Learning Through Practice
For less sophisticated fraudsters, learning often happens through experimentation. By attempting small-scale scams, they refine their techniques and build confidence. For example, someone running a phishing scheme might start by targeting low-profile individuals before scaling up to more complex operations. This trial-and-error approach allows fraudsters to identify what works and what doesn’t, gradually honing their skills. While this method is less structured than formal training, it highlights the adaptability and resilience of those involved in fraudulent activities.
Constraints on Criminal Talent
If the growth of fraud is limited by the availability of trained criminals, what factors constrain the supply of such individuals?
Overview
-
- Recruitment Challenges: Identifying and recruiting individuals willing to engage in criminal activity is not always straightforward. Potential recruits must have the right combination of skills, motivations, and risk tolerance.
- Training Time: Developing the necessary skills for sophisticated fraud can take years. This time investment creates a bottleneck in the availability of capable fraudsters.
- Attrition and Risk: Fraudsters face high risks of arrest, burnout, or internal conflicts within criminal organizations, which can limit their longevity in the field.
- Global Disparities: The availability of trained fraudsters may vary by region, depending on factors such as education levels, economic conditions, and access to technology.
Recruitment Challenges: Finding Willing Participants
Recruiting individuals willing to engage in fraud is not always straightforward. Criminal organizations must identify candidates who possess the right skills and are willing to take significant risks. Additionally, potential recruits often require a certain level of trustworthiness within the criminal network to avoid infiltration by law enforcement. This makes the recruitment process selective and time-consuming, creating a natural bottleneck in the supply of trained fraudsters.
Training Time: A Lengthy Investment
Developing the skills needed for sophisticated fraud takes time, particularly for schemes requiring technical expertise or financial acumen. Unlike entry-level scams, complex operations demand months or even years of preparation and training. This time investment slows the rate at which new fraudsters can enter the field, limiting the overall expansion of fraud operations.
Attrition and Risk: High Turnover in Criminal Enterprises
The risks associated with fraud, including arrest, burnout, or internal conflicts, can reduce the longevity of those involved. High-profile arrests often serve as a deterrent, forcing organizations to constantly replenish their ranks. Additionally, the psychological toll of engaging in deceitful activities can lead to attrition, further constraining the growth of fraud.
Global Disparities: Uneven Distribution of Talent
The availability of trained fraudsters varies significantly by region, influenced by factors such as access to technology, education levels, and economic conditions. In regions with limited access to training resources, the pool of potential fraudsters may be smaller, creating geographic disparities in the prevalence of fraud.
By expanding these points into detailed paragraphs, we gain a deeper understanding of how the availability of trained criminals acts as a critical limiting factor in the expansion of fraud. Recognizing these dynamics can help inform more effective prevention and enforcement strategies.
Implications for Fraud Prevention
If the expansion of fraud is indeed constrained by the availability of trained criminals, targeting this bottleneck could be a strategic approach to combating fraud.
Overview
-
- Disrupting Training Ecosystems: Law enforcement and cybersecurity professionals can target online forums, dark web marketplaces, and other platforms where fraudsters share knowledge and tools.
- Increasing Deterrence: By improving detection and prosecution rates, authorities can raise the perceived risks of engaging in fraud, discouraging potential recruits.
- Reducing Opportunities for Insider Threats: Companies can implement stronger internal controls and employee monitoring to prevent skilled individuals from turning to fraud.
- Public Awareness Campaigns: Educating the public about common scams can reduce the effectiveness of fraud schemes, making it less lucrative for criminals.
- Leveraging AI and Automation: Advanced technologies can help identify and disrupt fraud operations, reducing the need for human intervention in detection efforts.
Targeting Training Ecosystems
Law enforcement and cybersecurity professionals can disrupt the ecosystems that train and equip fraudsters by targeting online forums, dark web marketplaces, and other platforms where illicit knowledge is shared. These platforms often act as hubs for exchanging tools, tutorials, and techniques, providing aspiring criminals with a low-risk entry point into fraud. By infiltrating these communities, seizing their infrastructure, or using advanced analytics to monitor activity, authorities can dismantle key components of the fraud training pipeline. Such actions not only reduce the availability of skilled fraudsters but also send a clear message that these spaces are under scrutiny, deterring would-be participants.
Increasing Deterrence
Improving detection and prosecution rates is critical to raising the perceived risks associated with fraud. Currently, many fraudsters operate with the assumption that the chance of getting caught is low, especially in cross-border schemes. By allocating more resources to investigative efforts, enhancing international cooperation, and publicizing successful prosecutions, authorities can shift this perception. Effective deterrence also requires visible consequences, such as significant penalties, to dissuade individuals from pursuing fraudulent activities. When the risks outweigh the rewards, the pool of potential fraudsters may shrink, helping to curb the growth of criminal operations.
Reducing Opportunities for Insider Threats
Companies play a pivotal role in preventing skilled individuals from turning to fraud by implementing stronger internal controls and employee monitoring systems. Insider threats often arise when disgruntled or opportunistic employees exploit their access to sensitive information or systems. By adopting robust measures such as multi-factor authentication, role-based access controls, and regular audits, businesses can minimize vulnerabilities. Additionally, fostering a culture of ethics and accountability, coupled with clear whistleblowing channels, can discourage employees from engaging in fraudulent behavior. These steps not only protect organizations but also reduce the pool of individuals with the knowledge and access needed to commit sophisticated fraud.
Public Awareness Campaigns
Educating the public about common scams is one of the most effective ways to disrupt fraud operations. When potential victims recognize red flags, they become less susceptible to manipulative tactics, reducing the profitability of these schemes. Public awareness campaigns can leverage social media, community outreach, and partnerships with businesses to disseminate information about emerging scams and prevention tips. For example, highlighting the dangers of phishing emails, fake job postings, or romance scams can empower individuals to make informed decisions. When fraudsters encounter resistance from a more educated public, their success rates drop, making these schemes less attractive and profitable.
Leveraging AI and Automation
Advanced technologies like artificial intelligence (AI) and automation can significantly enhance the ability to detect and disrupt fraud operations. AI-driven tools can analyze vast amounts of data to identify suspicious patterns, flag anomalies in financial transactions, and predict fraudulent activity. Automation can streamline monitoring and enforcement, enabling organizations and law enforcement to respond more quickly to emerging threats. For instance, AI algorithms can detect phishing websites or deepfake scams in real time, reducing the window of opportunity for fraudsters to act. By reducing the need for human intervention in detection efforts, these technologies create a more proactive and efficient defense against fraud.
The Need for Massive International and Local Law Enforcement Expansion
The relentless growth of fraud and cybercrime underscores an urgent need for a massive expansion of both international and local law enforcement efforts. As fraudulent schemes become increasingly sophisticated and global in scope, current enforcement capabilities often fall short of addressing the scale and complexity of these crimes. Tackling fraud requires not only stronger legal frameworks but also vastly expanded resources, personnel, and cross-border collaboration to keep pace with ever-evolving criminal enterprises.
International Coordination and Expansion
Fraud is a global issue that transcends borders, making international cooperation among law enforcement agencies indispensable. Criminal networks often operate across multiple jurisdictions, exploiting disparities in laws, enforcement priorities, and technological capabilities. For example, a phishing operation may involve a scammer in one country, servers in another, and victims scattered across the globe. Without robust international coordination, these complex networks can evade detection and prosecution.
To counter this, there is a need for:
-
-
- Global Task Forces: Establishing well-funded, permanent international task forces dedicated to combating fraud can improve intelligence sharing, streamline investigations, and facilitate swift cross-border action.
- Unified Legal Frameworks: Standardizing laws and penalties for fraud-related crimes can streamline extradition processes and eliminate safe havens for criminals.
- Increased Funding for Global Initiatives: Organizations like INTERPOL, Europol, and regional task forces need significantly more funding to build specialized units focused on fraud and cybercrime. This includes investing in advanced technologies and personnel training to combat sophisticated schemes.
- Enhanced Technology Sharing: Advanced tools like AI and blockchain analysis should be shared between nations to improve fraud detection and tracing stolen assets.
- Training and Support: Developing training programs for law enforcement agencies worldwide would ensure a unified understanding of modern fraud tactics and effective countermeasures.
- Real-Time Information Sharing: Expanding platforms that facilitate real-time data sharing between countries can help law enforcement track criminals, identify trends, and dismantle networks before they are aware they are being monitored.
-
Strengthening Local Law Enforcement Capabilities
At the local level, police forces and regulatory agencies are often the first line of defense against fraud. However, they are frequently underfunded and lack the specialized training needed to handle complex fraud schemes. Strengthening local enforcement is essential to intercepting fraud operations before they escalate into large-scale crimes.
-
-
- Specialized Fraud Units: Local law enforcement should establish dedicated fraud and cybercrime units staffed by specialists trained in technology, financial crimes, and social engineering tactics.
- Increased Funding: Allocating significant resources to local agencies would enable them to hire more personnel, invest in advanced tools, and conduct thorough investigations.
- Community Outreach: Educating local communities about common fraud schemes and how to report them would empower citizens to act as the first line of defense.
- Integrated Partnerships: Local agencies should partner with banks, tech companies, and community organizations to create a collaborative approach to identifying and stopping fraud.
-
The Case for Vast Expansion
The rapid rise of fraud has created a situation where current enforcement efforts are often overwhelmed. Criminals operate with relative impunity, knowing that law enforcement lacks the resources to catch and prosecute them effectively. A massive expansion of both international and local law enforcement is no longer optional; it is a necessity.
This expansion would serve several critical purposes:
-
-
- Deterrence: Increased enforcement would raise the perceived risk for criminals, discouraging participation in fraud schemes.
- Swift Action: Enhanced capabilities would enable law enforcement to respond to fraud cases in real-time, minimizing damage to victims and disrupting criminal networks.
- Prosecution Rates: More resources would lead to higher prosecution rates, sending a strong message that fraud will not be tolerated.
- Adaptability: Expanded law enforcement would be better positioned to evolve alongside fraud tactics, ensuring ongoing effectiveness.
-
Conclusion
Fraud is a global epidemic that requires a proportionate and coordinated response. Massive investments in international and local law enforcement are essential to closing the gaps that fraudsters exploit. By building a robust and interconnected enforcement network, we can protect individuals, businesses, and economies from the devastating impacts of fraud. The time for decisive action is now.
The hypothesis that the expansion of fraud is limited by the availability of trained criminals provides a compelling lens through which to understand the dynamics of this global issue. While technological and systemic vulnerabilities create opportunities for fraud, the ability to exploit these opportunities ultimately depends on the presence of skilled individuals.
By focusing on the human element of fraud—both in terms of prevention and enforcement—society can address one of the critical factors enabling this growing threat. As fraud schemes become increasingly sophisticated, countering them will require a nuanced understanding of the motivations, training, and networks that underpin the criminal workforce.
References
- Leong, W. Y., Leong, Y. Z., & Leong, W.-. (2024). The Intersection of Scammers and Artificial Intelligence. 2024 International Conference on Consumer Electronics – Taiwan (ICCE-Taiwan). https://www.semanticscholar.org/paper/120778f43f2c37d6fdc91c46ebe435b602e5e681
- Suela, L. C. (2024). Online Fraud Exposed: Tactics and Strategies of Cyber Scammers. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. https://www.semanticscholar.org/paper/073bd496fc444c7b0a5a3c7216afbfe034d706c4
- Wilson, S., Hassan, N. A., Khor, K. K., Sinnappan, S., Bakar, A. R. A., & Tan, S. A. (2023). A holistic qualitative exploration on the perception of scams, scam techniques and effectiveness of anti-scam campaigns in Malaysia. Journal of Financial Crime. https://www.semanticscholar.org/paper/555cfbd89da75e6e09e3a8ad0065f6300e736450
- Imtiaz, A., Shehzad, D., Nasim, F., Afzaal, M., Rehman, M., & Imran, A. (2023). Analysis of Cybersecurity Measures for Detection, Prevention, and Misbehaviour of Social Systems. 2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS). https://www.semanticscholar.org/paper/436f39f1046b78727644ee814a5060dfc492bd02
- Marzuoli, A., Kingravi, H., Dewey, D., & Pienta, R. S. (2016). Uncovering the Landscape of Fraud and Spam in the Telephony Channel. 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). https://www.semanticscholar.org/paper/78fe22f77eb45808bf50b2a1c22f3112aea88438
- Shah, A. (2020). A Study of Online Scams. https://www.semanticscholar.org/paper/b469a810910cbb975527c618c8f20bce9f4ebea2
- Chua, C., Wareham, J., & Robey, D. (2007). The Role of Online Trading Communities in Managing Internet Auction Fraud. MIS Q. https://www.semanticscholar.org/paper/7ab8ab30c72fbe301c5606b1c5831440353ea8d2
- Chiluwa, I. (2009). The discourse of digital deceptions and ‘419’ emails. Discourse Studies. https://www.semanticscholar.org/paper/37cc44af7c3089e72007b5a00bcd5afb0ac331e8
- Atkins, B., & Huang, W. (2013). A Study of Social Engineering in Online Frauds. Open Journal of Social Sciences. https://www.semanticscholar.org/paper/e868fb7f1ea53fd018689a64a0cdef8fc76f75b3
- Schaper, M. T., & Weber, P. (2012). UNDERSTANDING SMALL BUSINESS SCAMS. Journal of Enterprising Culture. https://www.semanticscholar.org/paper/2a652726788380aba77b72ed13445c6f5e998a14
- Tripathy, S. S. (2024). A comprehensive survey of cybercrimes in India over the last decade. International Journal of Science and Research Archive. https://www.semanticscholar.org/paper/a72842ba6f4597fdd9df46c112e2ca4c19d1a046
- Malik, A. A., Azeem, W., & Asad, M. (2024). Information Systems and Mechanism for Prevention of Cyber Frauds. International Journal for Electronic Crime Investigation. https://www.semanticscholar.org/paper/5b9ce013146bbf6d1a04b93c021dd1436f8019d6
- Jewkes, Y. (2006). Book Review: Cybercrime and Society. Crime, Media, Culture: An International Journal. https://www.semanticscholar.org/paper/b194611b0930358c7b06d0df9001a74c9f054f3e
- Pocher, N. (2020). The Open Legal Challenges of Pursuing AML/CFT Accountability within Privacy-Enhanced IoM Ecosystems. https://www.semanticscholar.org/paper/1e783613802019583e03fea26c3d9443617a24ea
- Jiang, W., Xu, Y., Guo, H., & Zhang, L. (2014). Dynamic trust calculation model and credit management mech-anism of online trading. https://www.semanticscholar.org/paper/fb6d36fc34cd3b72e5522bb6d700302b61d0c209
- Rzeplińska, I. (2016). Zapobieganie przestępczości cudzoziemców w Polsce. Archives of Criminology. https://www.semanticscholar.org/paper/ff97adf8c9071be444381a2979124fd3eeaa2fed
- Zhang, W., Zhang, Y., Huang, Y., Chen, F., Wang, J., & Hu, X. (2023). GUFAD: A Graph-based Unsupervised Fraud Account Detection Framework. Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application. https://www.semanticscholar.org/paper/d7b06ccd27774e61090081868c9b5c3c060ac5c1
- McGee, J., Sandridge, L., Treadway, C., Vance, K., & Coustasse, A. (2018). Strategies for Fighting Medicare Fraud. The Health Care Manager. https://www.semanticscholar.org/paper/a2350b105a0c18b83705d70c1d89a4c8d387786b
- Button, M. D., Hock, B., Shepherd, D., & Gilmour, P. (2023). Understanding the rise of fraud in England and Wales through field theory: Blip or flip? Journal of Economic Criminology. https://www.semanticscholar.org/paper/458ec7697d3637318515033f36a7a4a3e9f0b79a
- León, K., & Ken, I. (2019). Legitimized fraud and the state-corporate criminology of food – a Spectrum-based theory. Crime, Law and Social Change. https://www.semanticscholar.org/paper/1735131f1a21ca63588cb06dd35585c13b2cf207
- Petryakova, L. A. (2023). Prevention of Fraud in the Banking Sector. Russian Journal of Criminology. https://www.semanticscholar.org/paper/f76ae7086be738d2f7724302052166277c800be9
- Hignett, K. (2010). The Changing Face of Organized Crime in Post-Communist Central and Eastern Europe. Debatte: Journal of Contemporary Central and Eastern Europe. https://www.semanticscholar.org/paper/72f185e6abedb0af3ac3f6d456f6d980a04d396c
- Miklaucic, M., & Brewer, J. (2013). Convergence: Illicit Networks and National Security in the Age of Globalization. https://www.semanticscholar.org/paper/6145f383f8b025408eb0b3574b7b3593f0c9433a
- Alvesalo-Kuusi, A., & Barak, G. (2020). The Inaugural Issue of the Journal of White Collar and Corporate Crime. Journal of White Collar and Corporate Crime. https://www.semanticscholar.org/paper/9fa60760a5eb8aaffd9f15d0881c82f64809cc42
- Niţu, M., & Sandu, A. (2013). CORRUPTION AND ORGANIZED CRIME. Contemporary Readings in Law and Social Justice. https://www.semanticscholar.org/paper/bd80c72a3c56614644cb1d4a48c92aed9c88caaa
Please Rate This Article
Please Leave Us Your Comment
Also, tell us of any topics we might have missed.
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.
Recent Reader Comments
- on Gisèle – Another Stolen Identity Used By Scammers: “You know it was a scam, right?” Jan 5, 07:17
- on Scammers By Name: Sexy Horny Lusty & Juicy: “Sadly, this is a classical scam. We encourage you to visit www.ScamVictimsSupport.org to learn how to get started.” Jan 5, 07:16
- on Scammers By Name: Sexy Horny Lusty & Juicy: “I believe the first Attorney may be fake,the new Attorney is Parker Association Cleke , I believe that is a…” Jan 4, 22:49
- on Scammers By Name: Sexy Horny Lusty & Juicy: “I believe that I was scammed by someone pretending to be,Grace Thomas and, retired,Karen Dreams. From July 25th,’24, To, January…” Jan 4, 22:45
- on Gisèle – Another Stolen Identity Used By Scammers: “contacted by a cassie tiffany cooper stating she was xo gisele in the past and was attempting to srart a…” Jan 1, 18:45
- on Scammer Lures Used To Exploit Your Needs: “The formula of behavior that drives wants, needs and greed in consumption spoke to me so loudly. Scammers use this…” Jan 1, 16:49
- on Scam Victim’s Guide on How To Guard Against Identity Theft After a Scam – 2025: “While I recognize the information I read is for all, I looked at each principle as it was tailored just…” Jan 1, 16:31
- on Scam Victim Self-Hatred And Self-Loathing: “I did experience self-hatred for almost a year, although with less intensity as the months were passing by because I…” Dec 17, 18:43
- on Facebook’s Algorithm Monster Actively Works Against Scam Victims – 2024: “Bueno es algo que no debería sorprenderme después de que Facebook está lleno de perfiles falsos .. en fin las…” Dec 17, 12:18
- on Scam Victims – Preparing for the Next Scam Fraud or Cybercrime – 2024: “I cannot afford to let my guard down. That is my new normal mode of operation.” Dec 15, 22:14
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
SCARS Resources:
- Getting Started Right: ScamVictimsSupport.org
- Sextortion Scam Victims: Sextortion Victims Support – The Essentials (scamvictimssupport.org)
- For New Victims of Relationship Scams newvictim.AgainstScams.org
- Subscribe to SCARS Newsletter newsletter.againstscams.org
- Sign up for SCARS professional support & recovery groups, visit support.AgainstScams.org
- Join our Scam Survivors United Chat & Discussion Group facebook.com/groups/scam.survivors.united
- Find competent trauma counselors or therapists, visit counseling.AgainstScams.org
- Become a SCARS Member and get free counseling benefits, visit membership.AgainstScams.org
- Report each and every crime, learn how to at reporting.AgainstScams.org
- Learn more about Scams & Scammers at RomanceScamsNOW.com and ScamsNOW.com
- Scammer photos ScammerPhotos.com
- SCARS Videos youtube.AgainstScams.org
- Self-Help Books for Scam Victims are at shop.AgainstScams.org
- Worldwide Crisis Hotlines: https://blog.opencounseling.com/suicide-hotlines/
Other Cyber Resources
- Block Scam Domains: Quad9.net
- Global Cyber Alliance ACT Cybersecurity Tool Website: Actionable Cybersecurity Tools (ACT) (globalcyberalliance.org) https://act.globalcyberalliance.org/index.php/Actionable_Cybersecurity_Tools_(ACT)_-_Simplified_Cybersecurity_Protection
- Wizer Cybersecurity Training – Free Security Awareness Training, Phishing Simulation and Gamification (wizer-training.com)
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
To Learn More Also Look At Our Article Catalogs
Scam & Crime Types
More SCARS
- ScamsNOW Magazine – ScamsNOW.com
- ContraEstafas.org
- ScammerPhotos.com
- AnyScam.com – reporting
- AgainstScams.org – SCARS Corporate Website
- SCARS YouTube Video Channel
Leave a Reply