Book description
Cargo crime including theft, fraud, and the passage of contraband through commercial shipping lanes poses an enormous threat to security and the economy. This volume reviews emerging trends, identifies criminal tactics, discusses law enforcement response to cargo theft, and presents best practices to help businesses avoid victimization by cargo thieves. The book identifies the various modes of freight transportation and the differences in cargo crime activity in each mode. It examines the effective use of public and private information-sharing partnerships to thwart criminal activities and presents known profiles consistent in over 90 percent of contraband shipments.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- Foreword
- Preface
- Acknowledgments
- About the Author
- Chapter 1 - Cargo Crime: Definition and Trends (1/5)
- Chapter 1 - Cargo Crime: Definition and Trends (2/5)
- Chapter 1 - Cargo Crime: Definition and Trends (3/5)
- Chapter 1 - Cargo Crime: Definition and Trends (4/5)
- Chapter 1 - Cargo Crime: Definition and Trends (5/5)
- Chapter 2 - Modes of Freight Transportation (1/2)
- Chapter 2 - Modes of Freight Transportation (2/2)
- Chapter 3 - Perpetrators of Cargo Crime (1/6)
- Chapter 3 - Perpetrators of Cargo Crime (2/6)
- Chapter 3 - Perpetrators of Cargo Crime (3/6)
- Chapter 3 - Perpetrators of Cargo Crime (4/6)
- Chapter 3 - Perpetrators of Cargo Crime (5/6)
- Chapter 3 - Perpetrators of Cargo Crime (6/6)
- Chapter 4 - Industry Responses (1/5)
- Chapter 4 - Industry Responses (2/5)
- Chapter 4 - Industry Responses (3/5)
- Chapter 4 - Industry Responses (4/5)
- Chapter 4 - Industry Responses (5/5)
- Chapter 5 - Law Enforcement Responses (1/8)
- Chapter 5 - Law Enforcement Responses (2/8)
- Chapter 5 - Law Enforcement Responses (3/8)
- Chapter 5 - Law Enforcement Responses (4/8)
- Chapter 5 - Law Enforcement Responses (5/8)
- Chapter 5 - Law Enforcement Responses (6/8)
- Chapter 5 - Law Enforcement Responses (7/8)
- Chapter 5 - Law Enforcement Responses (8/8)
- Chapter 6 - Prevention and Awareness (1/10)
- Chapter 6 - Prevention and Awareness (2/10)
- Chapter 6 - Prevention and Awareness (3/10)
- Chapter 6 - Prevention and Awareness (4/10)
- Chapter 6 - Prevention and Awareness (5/10)
- Chapter 6 - Prevention and Awareness (6/10)
- Chapter 6 - Prevention and Awareness (7/10)
- Chapter 6 - Prevention and Awareness (8/10)
- Chapter 6 - Prevention and Awareness (9/10)
- Chapter 6 - Prevention and Awareness (10/10)
- Chapter 7 - Moving Forward (1/8)
- Chapter 7 - Moving Forward (2/8)
- Chapter 7 - Moving Forward (3/8)
- Chapter 7 - Moving Forward (4/8)
- Chapter 7 - Moving Forward (5/8)
- Chapter 7 - Moving Forward (6/8)
- Chapter 7 - Moving Forward (7/8)
- Chapter 7 - Moving Forward (8/8)
- Chapter 8 - Epilogue (1/2)
- Chapter 8 - Epilogue (2/2)
- Appendix: Southwest Transportation Security Council Freight Term Glossary (1/5)
- Appendix: Southwest Transportation Security Council Freight Term Glossary (2/5)
- Appendix: Southwest Transportation Security Council Freight Term Glossary (3/5)
- Appendix: Southwest Transportation Security Council Freight Term Glossary (4/5)
- Appendix: Southwest Transportation Security Council Freight Term Glossary (5/5)
- Bibliography
- Back Cover
Product information
- Title: Cargo Crime
- Author(s):
- Release date: October 2012
- Publisher(s): CRC Press
- ISBN: 9781466512467
You might also like
book
Crimeware
“This book is the most current and comprehensive analysis of the state of Internet security threats …
book
Digging for Disclosure: Tactics for Protecting Your Firm’s Assets from Swindlers, Scammers, and Imposters
Financial crimes and scandals constantly victimize sophisticated companies, investors, executives, and business deal-makers. Whether you’re planning …
book
The Coming China Wars: Where They Will Be Fought and How They Can Be Won, Revised and Expanded Edition
For years, China has served as the "factory floor" for global production, driving down prices for …
book
Handbook on Securing Cyber-Physical Critical Infrastructure
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on …