Global Index on Financial Losses due to Crime in the United States

Crime can have a volatile impact on investments. Despite the potential importance of crime rates in investments, there are no indices dedicated to evaluating the financial impact of crime in the United States. As such, this paper presents an index-based insurance portfolio for crime in the United States by utilizing the financial losses reported by the Federal Bureau of Investigation for property crimes and cybercrimes. Our research intends to help investors envision risk exposure in our portfolio, gauge investment risk based on their desired risk level, and hedge strategies for potential losses due to economic crashes. Underlying the index, we hedge the investments by issuing marketable European call and put options and providing risk budgets (diversifying risk to each type of crime). We find that real estate, ransomware, and government impersonation are the main risk contributors. We then evaluate the performance of our index to determine its resilience to economic crisis. The unemployment rate potentially demonstrates a high systemic risk on the portfolio compared to the economic factors used in this study. In conclusion, we provide a basis for the securitization of insurance risk from certain crimes that could forewarn investors to transfer their risk to capital market investors.


Introduction
The United States spends approximately between 2% and 6% of the nation's gross domestic product on crime victimization (Lugo et al., 2019). The Department of Justice reported that federal, state, and local governments spent more than $280 billion on criminal justice, including police protection, the court system, and prisons in 2012 (United States Department of Justice, 2020b). Also, the financial losses due to crime can be viewed as significant dynamic factors that can influence and even shock the financial market in the United States. In 2019, 6,925,677 property crimes were reported nationwide where the victims suffered losses estimated at $15.8 billion.
The Uniform Crime Reports published by the Federal Bureau of Investigation outline the financial losses caused by violent crimes (murder, rape, robbery, and aggravated assault) and property crimes (burglary, larceny-theft, motor vehicle theft and arson) (United States Department of Justice, 2020a). They define the aggregate crime rate as an index (known as UCR Index) for gauging fluctuations in the overall volume and rate of crime (Hindelang, 1974). This unweighted index does not utilize the intensities of heterogeneous crimes (Kwan et al., 2000). The Sellin-Wolfgang index addresses this issue by delineating a procedure for adding weights based on severities of crimes (Blumstein, 1974). However, it is correlated with the UCR index and provides little additional information.
Over the years, some other types of crimes have contributed immensely to security threats in the United States. In particular, cybercrime has grown exponentially with the expansion of internet usage and e-commerce. In 2019, the Internet Crime Complaint Center of the Federal Bureau of Investigation reported 467,361 complaints -an average of nearly 1,300 every day -with financial losses of more than $3.5 billion to individual and business victims (Internet Crime Complaint Center, 2020). Determining the economic impacts caused by these crimes could help policy makers assess the level of systemic risk related to future compensations (Lugo et al., 2019). Thus, this paper proposes an index updated with the impact of all emerging crime types that can be used to more accurately determine the economic impact of crime.
To create this index, we begin by examining the impact of crime on insurance policies in the United States by analyzing the financial losses associated with various types of crimes as reported by the Federal Bureau of Investigation. The objective of this research is to employ financial methods to construct a reliable and dynamic aggregate index based on economic factors to provide a basis for the securitization of insurance risk from crimes. Taking all the available data in uniform crime reports and internet crime reports, we model the financial losses generated by property crimes and cybercrimes. Then, we propose a portfolio based on the economic damages due to crimes and validate it via value at risk backtesting models.
We hedge the investments underlying the portfolio using two methods to assess the level of future systemic risk. First, we issue marketable financial contracts in our portfolio, the European call and put options, to help the investors strategize buying call options and selling put options in our portfolio based on their desired risk level. Second, we hedge the investment by diversifying risk to each type of crime based on tail risk and center risk measures. According to the estimated risk budgets, real estate, ransomware, and government impersonation mainly contribute to the risk in our portfolio. These findings will help investors to envision the amount of risk exposure with financial planning on our portfolio.
We evaluate the performance of our index with respect to economic factors to determine the strength of our index by investigating its resilience to the economic crisis. The unemployment rate potentially demonstrates a high systemic risk on the portfolio compared to the economic factors used in this study. Therefore, the key findings are intended to provide a basis for the securitization of insurance risk from crime. This will help insurers gauge investment risk in our portfolio based on their desired risk level and hedge strategies for potential losses due to economic crashes.
Despite the potential significance of crime rates in investments, none of the crime indices researched for this study take economic impacts in to account. Our proposed index attempts to address this shortcoming by creating a financial instrument for hedging the intrinsic risk. This index utilizes the significance of many types of crimes (total of 32) compared to the UCR index. Rather than assessing the weights based on severity, we provide risk budgets to identify the potential risk contribution of each crime type. In conclusion, the main contribution of this research is to provide investors an understanding of how crime can impact insurance risk, which would forewarn and allow them to transfer that risk to capital market investors.
The remainder of this paper's contents are as follows. First, we model the financial losses due to property crimes and cybercrimes reported by the Federal Bureau of Investigation to propose a portfolio and backtest it using value at risk models in section 2. In section 3, we provide fair values for European option prices and implied volatilities for our portfolio. Then, we find the risk attributed to each type of crime based on tail risk and center risk measures in section 4. We evaluate the performance of our index with respect to economic factors via stress testing in section 5. Finally, we make concluding remarks in section 6.

Financial Losses due to Crime in the United States
In this section, we propose an index based on the financial losses caused by various types of crimes reported between 2001 and 2019 as a proxy to assess the level of future systemic risk caused by crimes. First, we describe the crime data used in this study in section 2.1. Then, we model the multivariate time series of financial losses due to crimes in section 2.2. As a result, we propose a portfolio using the annual cumulative financial losses due to property crimes and cybercrimes. Finally, we perform backtesting for our index using value at risk models in section 2.3.

Crime Data Description
In this section, we define the types of crimes utilized for constructing our index. Using official data published by the Federal Bureau of Investigation (FBI), we considered financial losses caused by crimes committed in the United States between 2001 and 2019. We use the FBI's Internet Crime Reports Internet Crime Complaint Center (2020) to estimate the financial losses attributed to cybercrimes and Uniform Crime Reports United States Department of Justice (2020b) to assess the financial losses caused by property crimes (burglary, larceny-theft, and motor vehicle theft). Using the information collected from these two reports, we calculate the cumulative financial losses reported for the following 32 types of crimes United States Department of Justice (2020a); Internet Crime Complaint Center (2020): • Advanced Fee: An individual pays money to someone in anticipation of receiving something of greater value in return, but instead receives significantly less than expected or nothing.
• BEA/EAC (Business Email Compromise/Email Account Compromise): BEC is a scam targeting businesses working with foreign suppliers and/or businesses regularly performing wire transfer payments. EAC is a similar scam that targets individuals. These sophisticated scams are carried out by fraudsters compromising email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfer of funds.
• Burglary: The unlawful entry of a structure to commit a felony or a theft. Attempted forcible entry is included.
• Charity: Perpetrators set up false charities, usually following natural disasters, and profit from individuals who believe they are making donations to legitimate charitable organizations.
• Check Fraud: A category of criminal acts that involve making the unlawful use of cheques in order to illegally acquire or borrow funds that do not exist within the account balance or account-holder's legal ownership.
• Civil Matter: Civil lawsuits are any disputes formally submitted to a court that is not criminal.
• Confidence Fraud/Romance: A perpetrator deceives a victim into believing the perpetrator and the victim have a trust relationship, whether family, friendly or romantic. As a result of that belief, the victim is persuaded to send money, personal and financial information, or items of value to the perpetrator or to launder money on behalf of the perpetrator. Some variations of this scheme are romance/dating scams or the grandparent scam.
• Corporate Data Breach: A leak or spill of business data that is released from a secure location to an untrusted environment. It may also refer to a data breach within a corporation or business where sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.
• Credit Card Fraud: Credit card fraud is a wide-ranging term for fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction.
• Crimes Against Children: Anything related to the exploitation of children, including child abuse.
• Denial of Service: A Denial of Service (DoS) attack floods a network/system or a Telephony Denial of Service (TDoS) floods a service with multiple requests, slowing down or interrupting service.
• Employment: Individuals believe they are legitimately employed, and lose money or launders money/items during the course of their employment.
• Extortion: Unlawful extraction of money or property through intimidation or undue exercise of authority. It may include threats of physical harm, criminal prosecution, or public exposure.
• Gambling: Online gambling, also known as Internet gambling and iGambling, is a general term for gambling using the Internet.
• Government Impersonation: A government official is impersonated in an attempt to collect money.
• Harassment/Threats of Violence: Harassment occurs when a perpetrator uses false accusations or statements of fact to intimidate a victim. Threats of Violence refers to an expression of an intention to inflict pain, injury, or punishment, which does not refer to the requirement of payment.
• Identity Theft: Identify theft involves a perpetrator stealing another person's personal identifying information, such as name or Social Security number, without permission to commit fraud.
• Investment: A deceptive practice that induces investors to make purchases on the basis of false information. These scams usually offer the victims large returns with minimal risk.
Variations of this scam include retirement schemes, Ponzi schemes, and pyramid schemes.
• IPR Copyright: The theft and illegal use of others' ideas, inventions, and creative expressions, to include everything from trade secrets and proprietary products to parts, movies, music, and software.
• Larceny Theft: The unlawful taking, carrying, leading, or riding away of property (except motor vehicle theft) from the possession or constructive possession of another.
• Lottery/Sweepstakes: Individuals are contacted about winning a lottery or sweepstakes they never entered, or to collect on an inheritance from an unknown relative and are asked to pay a tax or fee in order to receive their award.
• Misrepresentation: Merchandise or services were purchased or contracted by individuals online for which the purchasers provided payment. The goods or services received were of measurably lesser quality or quantity than was described by the seller.
• Motor Vehicle Theft: The theft or attempted theft of a motor vehicle. A motor vehicle is self-propelled and runs on land surface and not on rails. Motorboats, construction equipment, airplanes, and farming equipment are specifically excluded from this category.
• Non-Payment/Non-Delivery: In non-payment situations, goods and services are shipped, but payment is never rendered. In non-delivery situations, payment is sent, but goods and services are never received.
• Overpayment: An individual is sent a payment/commission and is instructed to keep a portion of the payment and send the remainder to another individual or business.
• Personal Data Breach: A leak or spill of personal data that is released from a secure location to an untrusted environment. It may also refer to a security incident in which an individual's sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an unauthorized individual.
• Phishing/Vishing/Smishing/Pharming: Unsolicited email, text messages, and telephone calls purportedly from a legitimate company requesting personal, financial, and/or login credentials.
• Ransomware: A type of malicious software designed to block access to a computer system until money is paid.
• Real Estate/Rental: Fraud involving real estate, rental, or timeshare property.
• Robbery: The taking or attempting to take anything of value from the care, custody, or control of a person or persons by force or threat of force or violence and/or by putting the victim in fear.
• Social Media: A complaint alleging the use of social networking or social media (Facebook, Twitter, Instagram, chat rooms, etc.) as a vector for fraud. Social Media does not include dating sites.
• Terrorism: Violent acts intended to create fear that are perpetrated for a religious, political, or ideological goal and deliberately target or disregard the safety of non-combatants.
Whenever necessary, we use multiple imputations with the principal component analysis model to compute missing data Josse et al. (2011). Moreover, we adjust the financial losses for U.S. dollars in 2020 using the CPI Inflation Calculator available in the U.S. Bureau of Labor Statistics. Then, we model the time series of financial losses due to these crime types in section 2.2.

Modeling the Multivariate Time Series of Financial Losses due to Crimes
In this section, we model the financial losses due to the 32 types of crimes described in section 2. In each type of crime, we transform the series of financial losses to a stationary time series by taking the log returns: where L (i) t denotes the financial loss due to i th crime type at time t. Then, we fit the Normal Inverse Gaussian (NIG) distribution to each log return r (i) t series and estimate parameters using the maximum likelihood method. As a result, we have NIG Lévy processes for each type of crime. Moreover, since NIG has an exponential form at the moment generating function, we use these dynamic returns for option pricing in section 3. Then, for each NIG Lévy process, we generate 10,000 scenarios to obtain independent and identically distributed data for returns.

Backtesting the Portfolio
In this study, we propose a portfolio based on the annual cumulative financial losses due to all types of crimes described in section 2.1. Then, we convert this portfolio to a stationary time series by taking their log returns. We denote r t as the log return of the index at time t where µ t is drift and σ t is volatility: (2) Then, we model the log-returns using the ARMA(1,1)-GARCH(1,1) filter to eliminate the serial dependence. In particular, we use ARMA(1,1) Whittle (1953) to model the drift (µ t ) and GARCH(1,1) Bollerslev (1986) to model the volatility (σ t ) where φ 0 and α 0 are constants and φ 1 , θ 1 , α 1 and β 1 are parameters to be estimated. Moreover, the sample innovations, t , follows an arbitrary distribution with zero mean and unit variance.
In particular, we assume Student's t and NIG for the distributions of sample innovations, t . Then, we examine the performance of these two filters (ARMA(1,1)-GARCH(1,1) with Student's t innovations and ARMA(1,1)-GARCH(1,1) with NIG innovations) via backtesting. Furthermore, we utilize the better model obtained in this section to implement option pricing to our portfolio in section 3. We backtest the models using Value at Risk (VaR) measures Jorion (2007). In VaR backtesting Nieppola et al. (2009), we compare the actual returns with the corresponding VaR models. The level of difference between them helps to identify whether the VaR model is underestimating or overestimating the risk. Moreover, if the total failures are less than expected, then the model is considered to overestimate the VaR, and if the actual failures are greater than expected, the model underestimates VaR.
To perform backtesting, we use the residuals of filters between 2002 and 2015 to train the model. Then, the test window starts in 2016 and runs through the end of the sample (2019). We perform the backtesting for the out-of-sample data at the quantile levels of 0.01, 0.05, 0.25, 0.50, 0.75, 0.95, and 0.99. For the α quantile level, we define VaR as follows: where F (x) is the cumulative density function of the returns. Table 1 provides the results for VaR backtesting on ARMA(1,1)-GARCH(1,1) with Student's t and NIG filters. First, we perform the Conditional Coverage Independence (CCI) to test for independence Braione and Scholtes (2016). According to Table 1, both filters show independence on consecutive returns.
Then, we perform traffic light, binomial test, and proportion of failures (PoF) tests as frequency tests. ARMA(1,1)-GARCH(1,1) with Student's t model is generally acceptable in the frequency tests at most of the levels. However, ARMA(1,1)-GARCH(1,1) with NIG model fails at all the levels except the 0.5 level.

Option Prices for the Crime Portfolio
An option is a contract between two parties that gives one party the right, but not the obligation, to buy or sell the underlying asset at a prespecified price within a specific time. We provide fair prices of call and put options in our portfolio in section 3.2 based on the pricing model defined in section 3.1. Then, we investigate the implied volatilities of our index using the Black-Scholes and Merton model. Ultimately, the findings of this section are intended to help investors strategize buying call options and selling put options of our portfolio based on their desired risk level and predicted volatilities.

Defining a Model for Pricing Options
The theoretical value of an option estimates its fair value based on strike price and time to maturity 1 . In pricing options, the conventional Black-Scholes Model 2 assumes the price of a financial asset follows a stochastic process based on a Brownian motion with a normal distribution assumption. Since the asset returns are heavy-tailed in practice, the extreme variations in prices cannot be well captured using a normal distribution. With non-normality assumption, we implement a Lévy processes for asset returns. This provides better estimates for prices since the non-marginal variations are more likely to happen as a consequence of fat-tailed distribution-based processes 3 .
Among Lévy processes, the NIG process Barndorff-Nielsen (1997) is widely used for pricing options as it allows for wider modeling of skewness and kurtosis than the Brownian motion does. Thus, it enables us to estimate consistent option prices with different strikes and maturities using a single set of parameters. We use the NIG process to price options for the crime portfolio based on the estimated parameters for the returns obtained using the maximum likelihood estimation given in Table 2. The NIG process is a Brownian motion where the time change process follows an Inverse Gaussian (IG) distribution, i.e., the NIG process is a Brownian motion subordinated to an IG process. We define the NIG process (X t ) as a Brownian motion (B t ) with drift (µ) and volatility (σ) as follows   2 See Black and Scholes (1973) and Merton (1973) 3 See Mandelbrot and Taylor (1967); Clark (1973); Ken-Iti (1999); Hurst et al. (1997), and  At t = 1, we denote the process as X 1 ∼ N IG (µ, α, β, δ) with parameters µ, α, β, δ ∈ R such that α 2 > β 2 and the density given by The characteristic function of the NIG process is derived using ϕ Xt (t) = E e itXt , t ∈ R and is given by For pricing financial derivatives, we search for risk-neutral probability (Q) known as Equivalent Martingale Measure (EMM). The current value of an asset is exactly equal to the discounted expectation of the asset at the risk-free rate under Q. In particular, we use Mean-Correcting Martingale Measure (MCMM) for Q as it is sufficiently flexible for calibrating market data. In MCMM, the price dynamics of the price process (S t ) on Q is given by where M Xt () is the moment generating function of X t and r is the risk free rate. We model the risk-neutral log stock-price process for a given option pricing formula and our market model on Q as follows where ϕ Xt (v) = E(e ivXt ) is the characteristic function of X t in Eq. (8).
We obtain the EMM using MCMM as the pricing formula is arbitrage-free for the European call option pricing formula under Q. First, we estimate all the parameters involved in the process and add the drift term, X new t = X old t + mt, in such a way that the discounted stock-price process becomes a martingale.
We define the price of a European call contract (C) with underlying risky assets at t = 0 as for the given price process (S t ), time to maturity (T ), and strike price (K). When the characteristic function of the risk-neutral log stock-price process is known, Carr and Madan's study Carr and Madan (1998) derives the pricing method for the European option valuation using the fast Fourier transform. Following that, we price the European options contract with an underlying risky asset using the characteristics function, Eq (8), and fast Fourier transform to convert the generalized Fourier transform of the call price. For any positive constant a such that a < ∞ exists, we define the call price as where k = ln K and ϕ ln S (Q) t (v) is the characteristic function of the log-price process under Q. By utilizing call option prices in the put-call parity formula, we calculate the price of a put option in the crime portfolio.

Issuing the European Option Prices for the Crime Portfolio
In this section, we calculate the European call and put option prices for our portfolio using the pricing model, Eq (12), introduced in section 3.1. We provide European option prices by fixing S 0 to 100 in Eq (12), i.e., the price of the crime portfolio at time zero is 100 units, and the time to maturity is in days. Later, we provide the implied volatilities of the portfolio based on the volatilities of call and put option prices.
First, we demonstrate the relationship between call option prices, strike price (K), and time to maturity (T ) in Figure 1. These calculated prices help the investors to strategize buying the stocks in our portfolio at a predefined price (K) within a specific time frame (T ). Second, we show put option prices in Figure 2 to provide selling prices of the shares in our index. The prices of our options validate the fact that option prices decrease as the time to maturity increases for a given strike price.
Third, we determine the implied volatilities of our portfolio using the Black-Scholes and Merton model. This provides the expected volatility of our portfolio over the life of the option (T ). Figure  3 is the implied volatility surface with respect to moneyness (M ) and time to maturity (T ). In particular, we calculate moneyness as the ratio of the strike price (K) and stock price (S), i.e., M = K/S. Then, the volatilities for call and put option prices are shown in the regions of the surface with M < 1 and M > 1, respectively. The volatility surface demonstrates a volatility smile which is usually seen in the stock market. Figure 3 illustrates that implied volatility increases when the moneyness is further out of the money or in the money, compared to at the money (M = 1). In this case, volatility seems to be low, with a range of 0.8 and 1.2 in moneyness, compared to the other regions in the implied volatility surface, i.e., the options with higher premiums result in high implied volatilities. These findings help investors strategize buying call options and selling put options in our portfolio based on their desired risk level and predicted volatilities.

Risk Budgets for the Crime Portfolio
The investors intend to optimize portfolio performance while maintaining their desired risk tolerance level Mahanama and Shirvani (2020). In this section, we provide a rationale for investors to determine the degree of variability in our portfolio. Therefore, we provide the risk contribution related to each type of crime in section 4.2 using the risk measures defined in section 4.1. As a result, we present the main risk contributors and risk diversifiers in our portfolio. Ultimately, these risk budgets (the estimated risk allocations) will potentially help investors with their financial planning (maximizing the returns).

Defining Tail and Center Risk Measures
This section defines the risk measures that we use for assessing risk allocations in section 4.2. We determine the tail risk contributors and center risk contributors using expected tail loss and volatility risk measures, respectively Chow and Kritzman (2001); Boudt et al. (2013).
We use Conditional Value at Risk (CoVaR) Adrian and Brunnermeier (2011); Girardi and Ergun (2013) for finding the tail risk contributors in our portfolio at levels of 95% and 99%. We define the tail risk contribution of the i th asset at α level as follows: In order to find center risk contributors, we measure the volatility of asset prices using standard deviation. Since we utilize an equally-weighted portfolio, we denote the weight vector for 32 types of crimes as w = (w 1 , · · · , w 32 ) where w i = 1 32 . We define the volatility risk measure, R(w), using the covariance matrix, Σ, of asset returns (1) Hu et al. (2019): Then, the center risk contribution of the i th asset is given by Having outlined the risk measures, section 4.2 utilizes tail and center risk contributions to find the risk allocation for each type of crime defined in section 2.1.

Determining the Risk Budgets for the Crime Portfolio
This section assesses the risk attributed to each type of crime using the risk measures defined in section 4.1. First, we calculate the tail risk allocations (T R) using Eq (13) to find the main tail risk contributors in our portfolio. Then, we investigate the main center risk contributors in our index using center risk allocations (CR) computed using Eq (15). Finally, taking the main tail risk and center risk contributors into account, we find the main risk contributors of our portfolio.
In Table 3, we provide the center risk (CR) and tail risk (T R) allocations for each type of crime. We find the risk diversifiers in the portfolio using the negative risk allocations shown in Table 3. With significantly low center and tail risk diversifications, Misrepresentation and Social Media seems to be the potential main risk diversifiers in our portfolio. We consider the positive values outlined in Table 3 to identify the main risk contributors in our portfolio. We find the main tail risk contributors using the positive tail risk estimates at levels of 95% and 99%. At the 95% level, T R(95%), Real Estate, Ransomware, and Government Impersonation provide a relatively higher tail risk than the other factors. However, Real Estate, Ransomware, and Identity Theft seem to be the main tail risk contributors at the 99% level, T R(99%).
We determine the main center risk contributors in our portfolio using the positive center risk estimates, CR, illustrated in Table 3. Since Real Estate, Ransomware, and Government Impersonation demonstrate high volatility compared to the other types of crimes, they seem to be the main center risk contributors in our portfolio.
As Real Estate and Ransomware are both main tail risk and center risk contributors, they are the potential main risk contributors in our portfolio. These estimated risk budgets and the main risk contributors will help investors to envision the amount of risk exposure with financial planning on our portfolio.

Performance of the Crime Portfolio for Economic Crisis
We evaluate the performance of our portfolio using economic factors related to low income as they are known to be major root causes of crime. To investigate the robustness of the crime portfolio for inevitable economic crashes, we perform stress testing in section 5.2 based on the systemic risk measures defined in section 5.1 The findings of this section are intended to help to determine portfolio risks and serves as a tool for hedging strategies required to mitigate inevitable economic crashes.

Defining Systemic Risk Measures
In this section, we define the systemic risk measures used for stress testing the portfolio on crimes. We define three derived risk measures based on VaR (5) denoting Y as the portfolio and X as a stress factor Trindade et al. (2020).
CoVaR is a coherent measure of tail risk in an investment portfolio. In our study, we use a variant of CoVaR defined in terms of copulas Mainik and Schaanning (2014). Using the condition X ≤ VaR α (X) rather than the traditional CoVaR condition, X = VaR α (X), improves the response to dependence between X and Y . We define CoVaR at level α as The CoVaR for the closely associated expected shortfall is defined as the tail mean beyond VaR Mainik and Schaanning (2014). Furthermore, we use an extension of CoVaR denoted as Conditional Expected Shortfall (CoES). Then, we define CoES at level α as follows: Conditional Expected Tail Loss (CoETL) Biglova, Ortobelli, and Fabozzi (Biglova et al.) is the average of the portfolio losses when all the assets are in distress. CoETL is an appropriate risk measure to quantify the portfolio downside risk in the presence of systemic risk. We denote CoETL at level α as We quantify the market risk of our portfolio on crime using these systemic risk measures in section 5.2.

Evaluating the Performance of the Crime Portfolio for Economic Factors
In this section, we evaluate how well our portfolio would perform with economic factors related to low income. In particular, we test the impact of the Unemployment Rate, Poverty Rate, and Median Household Income on our index. We quantify the potential impact of these economic factors on our index using the systemic risk measures defined in section 5.1. Since the stress testing results indicate the investment risk in our portfolio, the investors can utilize the outcomes to hedge strategies for forthcoming economic crashes. Based on backtesing results in section 2.3, we use the ARMA(1,1)-GARCH(1,1) model with Student-t innovations for the log returns of our portfolio. Also, we apply this filter to log returns of the economic factors to eliminate inherent linear and nonlinear dependencies. Then, we fit bivariate NIG models to the joint distributions of independent and identically distributed standardized residuals of each economic factor and our portfolio on crime. Using these bivariate models, we generate 10,000 simulations for each joint density to perform a scenario analysis. In Table 4, we provide the empirical correlation coefficients of each simulated joint density with the corresponding economic factor. This table demonstrates weak correlations between the economic factors and the portfolio.
We utilize the simulated joint densities to compute the systemic risk measures. In Table 5, we provide the left tail systemic risk measures (CoVaR, CoES, and CoETL) on the portfolio at stress levels of 10%, 5%, and 1% on the economic factors -Unemployment Rate, Poverty Rate, Household Income. At each level, the Unemployment Rate provides the highest values for the three systemic risk measures compared to the other economic factors. Thus, among all the stressors, the Unemployment Rate demonstrates a significantly high impact on the index. Poverty Rate potentially has a low impact on the index according to the results of all three systemic risk measures at all stress levels.
In conclusion, the Unemployment Rate potentially has a high impact on the financial losses due to crimes in the United States. Hence, these findings will help investors gauge the market risk of our portfolio for hedging strategies to alleviate potential losses due to economic crashes.

Discussion and Conclusion
We proposed constructing a portfolio that outlines the financial impacts of various types of crimes in the United States. In order to that, we modeled the financial losses of crimes reported by the Federal Bureau of Investigation using the annual cumulative property losses due to property crimes and cybercrimes. Then, we backtested the index using VaR models at different levels to find a proper model for implementing in evaluation processes. As a result, we utilized ARMA(1,1)-GARCH(1,1) with Student's t model to evaluate the crime portfolio. We presented the use of our portfolio on crimes through option pricing, risk budgeting, and stress testing. First, we provided fair values for European call and put option prices (Figure 1 and 2) and implied volatilities (Figure 3) for our portfolio. Second, we found the risk attributed to each type of crime based on tail risk and center risk measures. Third, we evaluated the performance of our index for the economic crisis by implementing stress testing. According to the findings, in the United States, the Unemployment Rate potentially has a higher impact on the financial losses due to the crimes incorporated in this study compared to the Poverty Rate and Median Household Income.
The proposed portfolio on crimes is an attempt to implement a financial instrument for hedging the intrinsic risk induced by crime in the United States. The main objective of this index is to forecast the degree of future systemic risk caused by crimes. The findings, estimated option prices, risk budgets, and systemic risk outlined in the portfolio will help investors with financial planning on our portfolio and forewarn them to transfer insurance risk to capital market investors. While the portfolio on crimes is specifically constructed for the United States, it could be modified to calculate the risk in other regions or countries using a data set comparable to FBI crime data.