Abstract

The present chapter uses the script method developed by Cornish (1994) and applies situational crime prevention (SCP) techniques to a complex scheme of cigarette smuggling committed by Hezbollah supporters in the United States (U.S.). We build upon von Lampe’s (2010) study that applied SCP to cigarette smuggling by “routine” offenders (i.e., non-extremists) in Germany during the 1990s. Our study makes important contributions to the literature. First, few studies have applied the script method and SCP strategies to profit-driven crime, such as cigarette smuggling, committed by political extremists. In fact, we have uncovered no published research that has used the script approach to study Hezbollah or similar extremists1 and financial terrorism.2 Some studies have used the script approach to examine traditional terrorism, ideologically motivated violent acts (Clarke and Newman, 2006; Freilich and Newman, 2009) or financial terrorism committed by far-right extremists (Belli and Freilich, 2009). Clarke and Newman (2006) examined suicide bombing in Israel and used the script method to identify the resources and tools that were needed for successful attacks. Using this knowledge, they were able to devise possible intervention strategies. Additionally, Freilich and Chermak (2009) applied the script method to deadly encounters between the police and American far rightists, uncovering possible intervention points that could be used to prevent these events from turning deadly. Second, terrorism studies usually focus solely on ideologically motivated violence and ignore possible associations between terrorism and other crime forms. Indeed, most American terrorism databases and definitions, such as those of the Federal Bureau of Investigation (FBI), require “terrorist acts” to use “force or violence” and thus exclude non-violent offenses such as financial crimes (Belli and Freilich, 2009; Freilich, Chermak, and Simone, 2009; Hewitt, 2003; Schmid and Jongman, 1988; Smith, 1994; Weinberg, Pedahzur, and Hirsch-Hoefler, 2004). Currently, many extremists commit crimes that are typically associated with profit-driven crime (Belli, 2011; Belli and Freilich, 2009; deKieffer, 2008; Dishman, 2005; Hamm, 2007; Horgan and Taylor, 2003; Passas, 2003). Al Qaeda, Hezbollah, Hamas, and other similar extremists have committed crimes such as credit card and financial fraud to raise funds for their ideological goals (Belli, 2011; Kane and Wall 2005; Picarelli and Shelley, 2007; Smith and Damphousse, 2003). Also, far-right extremists associated with the tax protest movement employ andendorse tax evasion and related fraudulent activities as a form of anti-government protest (Belli, 2011; Belli and Freilich, 2009; Pitcavage, 1999). This chapter applies Cornish’s (1994) “script” analysis to a case study of cigarette smuggling committed by an extremist ring of Hezbollah supporters which involved contraband cigarette trafficking from North Carolina to Michigan whose revenues were transferred to Hezbollah sites in Lebanon (Shelley and Melzer, 2008). Hezbollah is a Shiite military, political, and social organization based in Lebanon that is regarded as a terrorist group by the U.S. Hezbollah committed acts of terrorism against American targets in Lebanon in the 1980s and 1990s. These attacks included separate bombings of the U.S. military’s marine barracks, the American embassy and the embassy annex, as well as the kidnapping of Americans, including the Central Intelligence Agency’s (CIA) bureau chief who was subsequently murdered. Collectively, these strikes claimed over 300 American lives. Hezbollah has also committed attacks against Israeli targets (Jaber, 1997). First, we describe the danger posed to the United States by financial terrorism, especially crimes committed by Hezbollah, Hamas, Al Qaeda, and similar extremists, and identify the threat posed by cigarette smuggling. Second, we outline the case study of the cigarette smuggling scheme. After Cornish’s “script” method is explained, we analyze the open source information on the situational conditions of criminal behaviors in the present case. Our goal is to uncover the facilitating factors that provided the opportunities for these crimes to be committed and to set forth specific SCP techniques that could be implemented to block such opportunities. Finally, the paper concludes with suggestions for future research.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call