Skip to main content
Top

2016 | OriginalPaper | Chapter

5. Case Studies

Author : Harald Haelterman

Published in: Crime Script Analysis

Publisher: Palgrave Macmillan UK

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter presents a number of case studies that illustrate the use of script analysis in a business environment. All cases are to some extent based on real-life examples reported upon in the press or shared by practitioners in the field. Where relevant and required, names of individuals and locations have been changed or removed to ensure strict confidentiality. The main purpose of this chapter is to demonstrate the potential of script analysis for preventive purposes. The crime types that were selected have deliberately been kept simple and straightforward as to allow the reader to gain sufficient understanding of the approach itself rather than to become distracted by the complexity of the incidents that are described. From gaining such initial understanding it will become evident that the value of script analysis becomes even more obvious when dealing with more complex crime types.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
See Haelterman et al. (2012) for an example of a detailed assessment of financial, ethical, and esthetical costs of situational crime prevention measures.
 
2
Average amount for the cargo theft incident reports (i.e. 332 in total) that contained information on the loss value (TAPA EMEA 2013: 7).
 
3
Average amount for the cargo theft incident reports (i.e. 363 in total) that contained information on the loss value (TAPA EMEA 2014: 5).
 
4
Initially the phenomenon was referred to as the ‘Romanian Method’. While this particular modus operandi originally stems from incidents that first occurred in Romania, TAPA EMEA emphasizes that it is by far not only Romanian criminals that appear to display it (TAPA EMEA n.d.: 2).
 
5
As the actual incident was not witnessed in real time and as no CCTV equipment was fitted on the trailer, it is unclear how many offenders or vehicles participated in the theft. While in some occasions only one vehicle is involved, there is evidence of offenders using up to three or more vehicles, either to carry the load that is taken off the trailer, to drive in front of the truck to control its speed, or to drive next to the truck to prevent it from changing lanes. For the sake of this case study, we assume that the offenders used three vehicles, two normal cars, and one vehicle big enough to carry the loot.
 
6
Please note that as they often relate to rather common customer features, the answers to such security questions can easily be retrieved by an offender via, for example, social engineering.
 
7
The data to produce such counterfeit cards is obtained through electronic copying of the card data, for example, by means of tiny skimming devices fitted in a false front that is installed on cash machines, or by an unscrupulous employee in a restaurant putting the card into an electronic copying device out of sight of the victim (Experian 2013: 10; CardWatch n.d.).
 
8
‘Tokenisation’ is the process by which sensitive information is being replaced with a randomly generated token or symbol as to ensure that this information is not transmitted or stored in an unsecure format (Kovacs 2014).
 
9
Video accessed on 20 July 2015 via https://​www.​youtube.​com
 
11
In some occasions the e-mail account is hacked and accessed by the criminals. In other instances an account is created which is very similar (but still distinct) from the CEO’s genuine e-mail account.
 
12
Money mules are individuals that serve as intermediaries for criminals and criminal organizations and that transport fraudulently gained money to fraudsters, sometimes without being aware (Source: Safe Internet Banking 2015a, b).
 
13
In this particular case, the outside legal counsel was not aware of any fraudulent set-up but got unintentionally involved to make the scam look more credible.
 
Literature
go back to reference Action Fraud. (n.d.). Bank Card and cheque fraud. Retrieved September 28, 2015, from http://www.actionfraud.police.uk/fraud-protection/bank-card-cheque-fraud Action Fraud. (n.d.). Bank Card and cheque fraud. Retrieved September 28, 2015, from http://​www.​actionfraud.​police.​uk/​fraud-protection/​bank-card-cheque-fraud
go back to reference Beauregard, E., Proulx, J., Rossmo, K., Leclerc, B., & Allaire, J. F. (2007). Script analysis of the hunting process of serial sex offenders. Criminal Justice and Behavior, 34, 1069–1084.CrossRef Beauregard, E., Proulx, J., Rossmo, K., Leclerc, B., & Allaire, J. F. (2007). Script analysis of the hunting process of serial sex offenders. Criminal Justice and Behavior, 34, 1069–1084.CrossRef
go back to reference Burges, D. (2012a). Cargo theft, loss prevention, and supply chain security (p. 392). Waltham: Butterworth-Heinemann. Burges, D. (2012a). Cargo theft, loss prevention, and supply chain security (p. 392). Waltham: Butterworth-Heinemann.
go back to reference Burges, D. (2012b). Hidden costs. Cargo Security International, October/November, pp. 46–48. Burges, D. (2012b). Hidden costs. Cargo Security International, October/November, pp. 46–48.
go back to reference Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies, Volume 3 (pp. 151–196). Monsey, NY: Criminal Justice Press. Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. In R. V. Clarke (Ed.), Crime prevention studies, Volume 3 (pp. 151–196). Monsey, NY: Criminal Justice Press.
go back to reference Cougar Mountain (n.d.). Expense Reimbursement Fraud, signs to Watch for. Retrieved May 11, 2016, from https://www.caugarmtn.com/expense-reimbursement-fraud-signs-watch/ Cougar Mountain (n.d.). Expense Reimbursement Fraud, signs to Watch for. Retrieved May 11, 2016, from https://​www.​caugarmtn.​com/​expense-reimbursement-fraud-signs-watch/​
go back to reference CargoNet. (2012). 2011 United States Cargo Theft Report. Retrieved August 7, 2012, from http://www. cargonet.com/cargo_theft_reports/2011.pdf. CargoNet. (2012). 2011 United States Cargo Theft Report. Retrieved August 7, 2012, from http://​www.​ cargonet.com/cargo_theft_reports/2011.pdf.
go back to reference CardWatch. (n.d.). About CardWatch. Retrieved September 28, 2015, from http://cardwatch.org.uk. CardWatch. (n.d.). About CardWatch. Retrieved September 28, 2015, from http://​cardwatch.​org.​uk.​
go back to reference Gill, M. (1994). Introducing crime at work. In M. Gill (Ed.), Crime at work (pp. 1–10). Leicester: Perpetuity Press. Gill, M. (1994). Introducing crime at work. In M. Gill (Ed.), Crime at work (pp. 1–10). Leicester: Perpetuity Press.
go back to reference Haelterman, H., Callens, M., & Vander Beken, T. (2012). Controlling access to pick-up and delivery vans: The cost of alternative measures. European Journal on Criminal Policy and Research, 18(2), 163–182.CrossRef Haelterman, H., Callens, M., & Vander Beken, T. (2012). Controlling access to pick-up and delivery vans: The cost of alternative measures. European Journal on Criminal Policy and Research, 18(2), 163–182.CrossRef
Metadata
Title
Case Studies
Author
Harald Haelterman
Copyright Year
2016
DOI
https://doi.org/10.1057/978-1-137-54613-5_5