NCJ Number
177293
Editor(s)
M Gill
Date Published
1995
Length
70 pages
Annotation
These seven articles and an introduction examine maritime crime with respect to its forms, domestic and international aspects, physical security measures, the role and responses of the police and the British customs service, and other issues.
Abstract
The discussions focus on fraud, piracy, arson, theft, deception, smuggling, and drug trafficking. They also examine security strategies, including containerization, boat watch, insurance, registration, and marking programs. The first two papers examine international aspects, including links between trading fraud and piracy and murder; the relationship between boat theft, fraud, and arson; ways in which the limitations of official documentation benefit international thieves; and the role of governments, maritime organizations, and banks in addressing international maritime crime. Another article discusses the security value of containers, traces the movement of products across the world, and explains how the introduction of more sophisticated handling procedures reduces the security of cargo. An analysis of the changing role of the British customs service in addressing maritime crime focuses on the ways in which it is responding to increasing drug trafficking and highlights the benefits of intelligence based on effective collaboration with organizations and countries, especially in Europe. A discussion of the British police response to maritime crime notes the shortcomings of policies of organizations such as insurance companies and critically examines recommended security measures. Another article presents findings from a survey of boat owners; results revealed that victimization levels varied with the offense, the type of boat, and the location and suggested possible crime prevention strategies. The final paper examines crime from the perspective of the boat owner, challenges the opinion that boat owners are apathetic about security, and discusses the benefits and limits of approaches such as watch schemes and tagging devices. Table, footnotes, and questions and answers for each chapter