Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Monitoring Online Illegal Wildlife Trade. Insights From Brazil and South Africa 

By Global Initiative Against Transnational Organized Crime 

The last decade and a half has seen an alarming surge in illegal wildlife trade (IWT) on the internet. However, a dearth of data regarding the scale of the market, its dynamics, operations and ramifications, especially on a global scale, is a significant hindrance to combating this crime. To address this, ECO-SOLVE is developing a Global Monitoring System (GMS) to systematically monitor global online IWT and gather data to feed into law enforcement activity and to inform policymaking. The GMS is a network of data hubs in countries whose domestic online markets are considered the largest or most consequential in their regions. The GMS’s national monitoring nodes are being set up in a staggered process and the size and scope of the network will grow with each edition of the Report. This Global Trend Report draws on data from two national data hubs: Brazil and South Africa. By identifying areas of high pressure on endangered species and ecosystems, monitoring may enable targeted interventions and inform law enforcement action to prosecute those responsible for wildlife crimes. Additionally, monitoring can help detect emerging trends and shifts in the trade, allowing for timely and effective responses to new threats and challenges. This is the second publication in a series of Global Trend Reports that aim to showcase and contextualize trends in online IWT. Reports will be published throughout the three years of the ECO-SOLVE project, with about two to four reports released per year. Drawing on findings generated by the GMS, each Global Trend Report will highlight the latest trends in statistical data, including the number of advertisements found, the species advertised as well as the platforms that host these adverts. Diving deeper into individual topics, the reports will offer regional breakdowns and include sections that contextualize and analyze findings, while also investigating changes in regulations and their effects on online IWT as well as trends in law enforcement. The reports will also discuss case studies of online IWT. Following the structure of the first Global Trend Report, the second issue begins with a trend analysis of online IWT drawing on data from regular monitoring carried out between May and July 2024 by GMS data hubs in Brazil and South Africa. The report then takes a closer look at the online and offline illegal trade in Pirarucu in Brazil, as well as the trade routes used and links to cocaine markets. The third section presents a case study of the illegal wildlife trade as linked to traditional medicines in South Africa, highlighting gaps around regulations and enforcement.   

Geneva:  Global Initiative Against Transnational Organized Crime, 2024. 33p.

The recruitment of young perpetrators for criminal networks 

By Europol

This intelligence notification is based on information contributed to Europol by national law enforcement authorities. This document aims to raise awareness of the ways criminal networks exploit minors, particularly through recruitment and tasking via social media. It highlights the use of targeted language, coded messaging, and "gamification" strategies in this process. The recruitment of minors into serious and organised crime and terrorism is not a new phenomenon; however, it has increasingly become a tactic used by criminal networks to avoid detection, capture, and prosecution. In recent years, this trend has expanded across more countries, with recruitment methods evolving and minors being tasked with violent acts such as extortion and killings  

Paris: Europol: 2024. 3p.

Understanding Toxic Panda: The New Cyber Threat Targeting Data Security

By Asmita Mallick and Prithwish Ganguli

Toxic Panda is a sophisticated Android banking trojan that targets users in Europe, Latin America, and Southeast Asia. Using advanced techniques like account takeover (ATO) and on-device fraud (ODF), it bypasses security mechanisms, including multi-factor authentication, to steal sensitive data and conduct unauthorized transactions. The malware's ability to manipulate user inputs and intercept one-time passwords makes it a significant threat. This paper explores the implications of ToxicPanda, highlights the evolving landscape of cybercrime, and offers insights into preventive measures and legal frameworks to combat emerging threats.

Unpublished paper, 2024.

The Epistemic Injustice of Genocide Denialism 

By Melanie Altanian

The injustice of genocide denial is commonly understood as a violation of the dignity of victims, survivors, and their descendants, and further described as an assault on truth and memory. This book rethinks the normative relationship between dignity, truth, and memory in relation to genocide denial by adopting the framework of epistemic injustice. This framework performs two functions. First, it introduces constructive normative vocabulary into genocide scholarship through which we can gain a better understanding of the normative impacts of genocide denial when it is institutionalized and systematic. Second, it develops and enriches current scholarship on epistemic injustice with a further, underexplored case study. Genocide denialism is relevant for political and social epistemology, as it presents a substantive epistemic practice that distorts normativity and social reality in ways that maintain domination. This generates pervasive ignorance that makes denial rather than recognition of genocide appear as the morally and epistemically right thing to do. By focusing on the prominent case of Turkey’s denialism of the Armenian genocide, the book shows the serious consequences of this kind of epistemic injustice for the victim group and society as a whole. The Epistemic Injustice of Genocide Denialism will appeal to students and scholars working in social, political, and applied epistemology, social and political philosophy, genocide studies, Armenian studies, and memory studies.

London; New York: Routledge, 2024. 194p.

‘A Lot of it is Actually Just Abuse’ Young People and Pornography

By The Children’s Commissioner for England

This report draws together research from focus groups with teenagers aged 13-19 and a survey of 1,000 young people aged 16-21. Of the 64% who said that they had ever seen online pornography: • We find that pornography exposure is widespread and normalized – to the extent children cannot ‘opt-out’. The average age at which children first see pornography is 13. By age nine, 10% had seen pornography, 27% had seen it by age 11, and half of children who had seen pornography had seen it by age 13. • We also find that young people are frequently exposed to violent pornography, depicting coercive, degrading or pain-inducing sex acts; 79% had encountered violent pornography before the age of 18. Young people expressed concern about the implications of violent pornography on their understanding of the difference between sexual pleasure and harm. Indeed, this report finds that frequent users of pornography are more likely to engage in physically aggressive sex acts. • Pornography is not confined to dedicated adult sites. We found that Twitter was the online platform where young people were most likely to have seen pornography. Fellow mainstream social networking platforms Instagram and Snapchat rank closely after dedicated pornography sites. At the time of publication, the UK’s landmark Online Safety Bill is making its way through Parliament. It holds the promise of, finally, regulating pornography sites and ensuring that they implement robust age verification to protect children. Now is a vital moment to ensure that we understand the impact of pornography on children’s lives, and to legislate for a commensurate response. This report is published as the Online Safety Bill passes through Parliament. The legislation, as currently drafted, imposes important age verification requirements (technical measures to establish someone’s age) on platforms which host pornography to prevent under-18s from accessing adult content online. The research contained within this report syntheses data from a nationally representative survey of over 1,000 young people aged 16-21 in England and two focus groups with teenagers aged 13-19. All research was conducted between November 2022 and January 2023 by the Children’s Commissioner’s Office (CCo) with an aim of understanding the prevalence of pornography exposure (both intentional and unintentional) among young people and its impacts on children’s safety and wellbeing. Differences between groups are only reported where they were statistically significant. The Commissioner intends for this report to aid Parliamentarians as they make crucial decisions about the protection of children from harmful content, including pornography, through the Online Safety Bill. The Commissioner also hopes that findings from this research will support the regulator, Ofcom, in their future enforcement regime, as well as parents, teachers and other key professionals, to understand and protect children from pornography’s impacts. The main research findings are set out below. Unless otherwise indicated, figures refer to young people who have ever viewed pornography. • Pornography consumption is widespread among children. The average age at which children first saw pornography was just 13 years old. • Many children are first exposed to pornography at a very young age. A significant minority of children access pornography at very young ages: 10% had seen it by age nine, 27% had seen it by age 11 and 50% of children had seen it by age 13. • Children often stumble accidentally across pornography online; 38% of 16-21-year-olds said that they had accidentally come across it online. In focus group discussions, young people told the CCo that accidentally viewing pornography for the first time made them feel ‘confused’, ‘insecure’, ‘troubled’ and ‘curious’. Chillingly, some young people spoke about the role of sexualised cartoons, depicting popular children’s characters and which appear in pop-up ads, in actively grooming young children towards adult pornography. • A significant minority of young people are sent explicit images involving a person known to them in real-life. Girls are disproportionately the target of ‘self-generated’ pornography, 51% of girls aged 16-21 had been sent or shown explicit content involving someone they know in real-life, compared to 33% of boys. • Twitter is the platform where the highest percentage of children had seen pornography; 41% of young people reported having seen it on Twitter. Dedicated pornography sites came next (37%), followed by Instagram (33%), Snapchat (32%) and search engines (30%). • Many young people seek out pornography online. Half (50%) of survey respondents, 58% of boys and 42% of girls, aged 16-21 said that they sought out online pornography themselves. • A significant proportion of males are frequent users of pornography. A fifth (21%) of males aged 16-21 viewed content at least once a day in the 2 weeks prior to the survey, compared to just 7% of girls. This is suggestive of a dependency which carries its own risk of interrelated harms. • Boys and those who first viewed online pornography at age 11 or younger were significantly more likely to become frequent users of pornography, consuming it twice or more per week. Focus group participants told us that pornography was sought for several reasons; sexual gratification, curiosity and to ‘learn’ about sex, and pressure to ‘fit in’ with peers. • Children are frequently exposed to violent pornography. The majority, 79%, of 18-21-yearolds had seen content involving sexual violence before turning 18. Early exposure to pornography and frequent consumption significantly increased the likelihood of viewing violent content. Young people are significantly more likely to see violence perpetrated against a woman (65%) than against a man (29%) in pornography. • A significant proportion of young people seek out violent pornography; 36% of young adults had sought out content involving at least one act of sexual violence. Again, a young age of first exposure and frequent consumption of pornography were predictors in the likelihood of actively seeking out violent content for sexual gratification.   

London: Children's Commissioner for England, 2023.   48p.

Evidence on Pornography’s Influence on Harmful Sexual Behavior Among Children

By The Children’s Commissioner for England

This is the second in a series of reports investigating the impact of pornography on young people, building upon the Children’s Commissioner’s report published in January 2023, “A lot of it is actually just abuse”, which set out findings from a survey of over a thousand 16-21-year-olds and focus groups with teenagers. This series of work shows the detrimental effect that pornography is having on children and young people. It adds weight to the Children’s Commissioner’s view that no child under the age of 18 should be able to access pornography. This report aimed to discover whether references to specific acts of sexual violence commonly seen in pornography could be found in official documents relating to the investigation of children who abused other children. It is not intended to be read by children, but by researchers and policy makers interested in making children safer. It makes frequent reference to sexual harassment and sexual violence, and includes descriptions of pornographic content, language, and discussion of sexual abuse. This content may be difficult to read, however, we think it is important to understand how pornography impacts children, in order that we may better protect all children from harm. The research contained within this report synthesises data from 502 documents of two types: 379 Achieving Best Evidence (ABE) transcripts of interviews with children who have been sexually harmed and children who have sexually harmed another child, from one police force, and 123 Sexual Assault Referral Centre (SARC) documents concerning children who were sexually harmed by other children from one NHS foundation trust.   

London: Children's Commissioner for England, 2023. 58p.

Youth Radicalisation in Singapore: A Growing Threat in the Digital Age

By Noor Huda Ismail

How can a nation celebrate its progress and connectivity and face a rising threat from within its young population? In Singapore, a city-state known for its public security and educational excellence, the menace of youth radicalization is taking place through online channels. This was illustrated by a recent case involving a self-radicalized 17-year-old, arrested under its Internal Security Act just weeks before he could execute a planned terror attack. How do online platforms turn seemingly ordinary youth into supporters of extremist ideologies?  Singapore, a global hub of progress, connectivity, and education, faces a challenge: youth radicalization through online platforms. A recent report by Singapore's Internal Security Department (ISD) highlighted the increasing vulnerability of young people to extremist ideologies. A 17-year-old self-radicalised Singaporean student was arrested just weeks before he could carry out a planned terror attack in the public housing heartlands. Described in a press release by the ISD on 18 October as a "staunch" supporter of the Islamic State of Iraq and Syria (ISIS), the student had intended to use a kitchen knife or a pair of scissors from his home as a weapon. Despite not having a deeply religious background, he became captivated by ISIS propaganda, ultimately pledging allegiance to the group and expressing a willingness to die for its cause. To be clear, however, pointing fingers at religion, in this case Islam, as the root cause of radicalisation is to bark up the wrong tree. With over two billion adherents worldwide, Islam has made significant contributions to civilization, including advancements in science, art, and philosophy. Those who become radicalised often have a shallow  understanding of Islamic teachings and are misled by distorted and fragmented online sources. Radicalisation involves fundamentally psychological mechanisms, not just religious ones. Under the right conditions, it can affect anyone, regardless of background. For example, the Israel-Palestine conflict shows how a sense of injustice, loss, and identity crisis can drive radicalisation on both sides, with young Palestinians and Israelis alike adopting extremist views out of frustration or fear. Similarly, groups like Hezbollah and countries like Iran exploit historical and geopolitical grievances to draw people into extremist ideologies. The real issue is the misuse of digital platforms, which amplify these distorted narratives and intensify radical views.   

Singapore: RSIS S. Rajaratnam School of International Studies, NTU Singapore, 2024. 4p.

Enhancing Intelligent Surveillance: A Hybrid Deep Learning Approach for Anomaly Detection, Violence Recognition, and Person Re-Identification" 

By Evany Anne Moses,  M. Brindha,  N. Sivaukumaran

In recent years, the demand for intelligent surveillance systems has grown significantly due to the increasing need for enhanced security in public and private spaces. This journal presents a comprehensive approach that integrates advanced deep learning techniques for anomaly detection, violence recognition, and person re-identification in surveillance videos. The proposed system leverages a hybrid model combining ResNet50 and 3D Convolutional Neural Networks (CNNs) to accurately detect violent activities in real time. Additionally, the system includes anomaly detection to identify unusual patterns in the video feed that may signal potential security threats. The system further incorporates YOLO for high-precision object detection, DeepSort for robust tracking, and OpenPose for pose estimation, enabling real-time monitoring and accurate identification of individuals across multiple frames. Experimental results demonstrate that the integrated system outperforms traditional methods in terms of accuracy, efficiency, and scalability, making it a powerful tool for modern surveillance applications. This work highlights the potential of combining multiple deep-learning approaches to create a more effective and reliable surveillance system capable of addressing diverse security challenges.

Unpublished paper, 2024. 34p.

Crossing the Deepfake Rubicon The Maturing Synthetic Media Threat Landscape

By Di Cooke, Abby Edwards, Alexis Day, Devi Nair, Sophia Barkoff, and Katie Kelly

THE ISSUE

  • In recent years, threat actors have increasingly used synthetic media—digital content produced or manipulated by artificial intelligence (AI)—to enhance their deceptive activities, harming individuals and organizations worldwide with growing frequency.

  • In addition, the weaponization of synthetic media has also begun to undermine people’s trust in information integrity more widely, posing concerning implications for the stability and resilience of the U.S.’s information environment.

  • At present, an individual’s ability to recognize AI-generated content remains the primary defense against people falling prey to deceptively presented synthetic media.

  • However, a recent experimental study by CSIS found that people are no longer able to reliably distinguish between authentic and AI-generated images, audio, and video sourced from publicly available tools.

  • That human detection has ceased to be a reliable method for identifying synthetic media only heightens the dangers posed by the technology’s misuse, underscoring the pressing need to implement alternative countermeasures to address this emerging threat.

CSIS, 2024. 11p.

Pornography Exposure and Access Among Young Australians: a Cross-Sectional Study

By  Maree Crabbe, Michael Flood,,  Kelsey Adams

This article aims to explore the extent and nature of Australian young people’s pornography exposure and access.

Methods

Cross-sectional online survey of 1,985 young Australians aged 15–20 years, nationally representative of a range of demographics.

Results

Exposure to pornography was reported by 86% of male and 69% of female participants. Most exposure occurred when participants were alone and at home, regardless of gender. Young men were more likely than young women to seek pornography out and to view it frequently, with over half (54%) of male participants reporting weekly use compared with 14% of female participants. On average, boys and young men saw pornography 3.2 years before their first partnered sexual experience, and girls and young women saw it 2.0 years before theirs.

Conclusions

It is common for young people to see pornography years before their first partnered sexual experience.

Implications for public health

Unintentional and deliberate exposure to pornography is common and frequent among young people. Public health strategies among young people are necessary to address the potential harms associated with pornography use, including gender-based violence and risky sexual practices.

Australian and New Zealand Journal of Public Health Volume 48, Issue 3, June 2024, 100135

Cryptographic security: Critical to Europe's digital sovereignty

By Stefano De Luca with Tristan Marcelin; Graphics: Samy Chahr

By the 2030s, quantum computers might compromise traditional cryptography, putting digital infrastructure at high risk in the European Union (EU) and around the world. Specifically, it is expected that quantum computers' unique capabilities will allow them to solve complex mathematical problems, such as breaking the traditional cryptographic systems used universally. The confidentiality, integrity and authenticity of sensitive data – including health, financial, security and defence information – will be exposed to threats from any actor possessing a sufficiently powerful quantum computer. There is a pressing need for the EU to start preparing its digital assets to face this risk. Post-quantum cryptography (which uses classical computer properties) and quantum cryptography (which uses quantum mechanical properties) are the two types of critical technology able to protect digital infrastructure from quantum computer attacks. Robust post-quantum cryptography algorithms have been identified, but swift and efficient implementation is crucial before malicious actors exploit the power of quantum computers. Experts stress the need for quantum preparedness to be put in place now, with some of them even warning of a 'quantum cybersecurity Armageddon'. Several countries are adopting strategies to address post-quantum cryptography. The EU is working with Member States and the United States to speed up the transition to post-quantum cryptography, and is also exploring long-term quantum cryptography initiatives.

Brussels: EPRS | European Parliamentary Research Service, 2024. 8p.

GangstaLife: Fusing Urban Ethnography with Netnography in Gang Studies

By Marta-Marika Urbanik & Robert A. Roks

Recent research on street-involved populations has documented their online presence and has highlighted the effects of their online presentations on their lives in the real world. Given the increasing conflation between the online and offline world, contemporary urban ethnographers should pay increased attention to their participants’ online presence and interactions. However, methodological training of this sort is still in its infancy stages and has not yet evolved to guide the growing number of researchers undertaking this form of research. This article draws from our experiences using social media in our urban ethnographies with criminally involved groups, to examine the benefits, risks, and challenges of drawing on social media in urban ethnography. It is intended to serve as a foundational piece that will hopefully ignite scholarly dialogue, debate, and methodological training relating to deploying social media in urban—and specifically—gang ethnography.

Qualitative Sociology 43(6) 2020.

Violence Against Journalists in Mexico: In Brief

By Clare Ribando Seelke

An upsurge in lethal attacks against journalists in Mexico since the start of 2022 has renewed interest in Congress about violence against journalists and the state of media freedoms in Mexico. Since 2000, more than 150 journalists and media workers have been killed in Mexico, including seven in 2021 and eight in the first few months of 2022. Violence against journalists is occurring within the context of a broader security crisis in Mexico fueled by organized crime-related violence. Nevertheless, the U.N. High Commissioner for Human Rights (OHCHR) and the Inter-American Commission on Human Rights (IACHR) have asserted that “impunity in attacks against [or murders of] journalists fosters further violence against reporters and may inhibit the exercise of freedom of expression.”  In February 2022, Secretary of State Antony Blinken stated that he joined “those calling for greater accountability and protections for Mexican journalists.”  Some congressional concerns about the killings of journalists in Mexico have prompted letters to the Biden Administration and hearing questions to Administration officials regarding the extent to which the U.S. government is urging Mexico to better prevent, investigate, and prosecute cases of violence against journalists. Congress has appropriated foreign assistance to help the Mexican government and civil society better protect journalists and reduce impunity in cases of crimes committed against them. An oversight issue for the 117th Congress may be the extent to which the protection of journalists and other vulnerable groups is prioritized under the new U.S.-Mexico Bicentennial Framework for Security Cooperation signed in October 2021. Congress also may examine whether other tools, such as conditions on foreign assistance, sanctions, or legislation, could be used to improve the situation.  

Washington, DC:  Congressional Research Service , 2022. 15p.

Torture by Non-State Actors: Four Inquiries 

By Ginevra Le Moli

In legal discourse, ‘torture’ is a term used to describe the deliberate infliction of severe physical or mental pain and suffering upon a person. One controversial aspect of the legal definition of torture has been the status of the perpetrator, whose acts are relevant for the torture definition under international law. This ambiguity came to the forefront in the judgment of the United Kingdom (UK) Supreme Court in R v. Reeves Taylor, where the Court ruled that the category of persons ‘acting in an official capacity’ (under section 134 of the Criminal Justice Act 1988, which implements the United Nations Convention against Torture) included members of armed groups if those groups exercise governmental authority over a civilian population in a territory under their control. This article relies on R v. Reeves Taylor as a gateway for a wider analysis of four fundamental inquiries into the definition and operation of the crime of torture: (i) the rationales underlying the international criminal repression of torture; (ii) the rules (including the UN Convention as well as other rules) which give expression to different rationales; (iii) the spectrum of actors whose acts can constitute torture under different rationales and rules; and (iv) the wider implications of expanding the spectrum of possible perpetrators.

Journal of International Criminal Justice, Volume 19, Issue 2, May 2021, Pages 363–391,

“Say it’s Only Fictional”: How the Far-Right is Jailbreaking AI and What Can Be Done About It  

By Bàrbara Molas and Heron Lopes

This research report illustrates how far-right users have accelerated the spread of harmful content by successfully exploiting AI tools and platforms. In doing so, it contributes to improving our understanding of the misuse of AI through new data and evidence-based insights that may inform action against the dissemination of hate culture through the latest technologies.  

  The Hague: The International Centre for Counter-Terrorism (ICCT), 2024. 27p.

Illegal Mining and Associated Crimes:  A Law Enforcement Perspective On One Of the Most Lucrative Crimes

Environmental crime is a serious and growing international issue, which takes many different forms and impacts origin, source, transit and consumer countries. Broadly speaking, environmental crime is a collective term for “illegal activities harming the environment and aimed at benefiting certain individuals, groups or companies through the exploitation and theft of, or trade in natural resources”. This crime area includes corporate crime in the forestry sector, illegal exploitation and sale of gold and minerals, illegal fishing and associated criminal activities in the fisheries’ sector, trafficking in hazardous waste and chemicals, the illegal exploitation of the world’s wild flora and fauna, and wealth generated illegally from natural resources being used to support non-state armed groups and terrorism. Environmental crime is low-risk and high profit for criminals. This crime area has been recently defined as the third largest criminal sector worldwide, after drugs, counterfeit goods and trafficking. In terms of economic loss, just illegal logging, fishing and wildlife trade have an estimated value of $1 trillion or more per year.  Although “illegal mining” has no universal definition, INTERPOL defines it as an umbrella term covering both illegal extraction and trade of minerals, including the illegal use of toxic chemicals (such as cyanide and mercury) in mining activities. Illegal mining has evolved into an endemic and lucrative enterprise in several regions across the globe, with seriously damaging consequences in terms of: • Socio-economic development, due to the high profits generated from illicit assets of approximately 12-48 billion USD per year,5 undermining government revenues; • Peace and stability, as terrorist organizations, armed rebel groups and drug cartels use the sector as both a funding source and a money laundering enabler. In conflict regions, the mining sites are controlled by Organized Crime Groups and have become hotspots for widespread violence; • Human rights in vulnerable communities, who are exposed to i) human trafficking, forced labor, child and women abuse/ exploitation and pervasive (sexual) violence; ii) health issues for local miners and adjacent communities - caused by the chemical substances and environmental-; and iii) human displacements to facilitate the business; and • The environment. Illegal mining causes water and land poisoning via the release of toxic chemicals (e.g. mercury, arsenic, and cyanide), as well illegal deforestation, biodiversity and habitat loss, erosion, sinkholes, and atmospheric carbon emissions. The subsequent illegal trade of gems and precious metals, coupled with corruption and money laundering, is often perpetrated by organized crime. The criminal groups operating in the illegal mining sector are also often involved in other crime areas. These criminal activities pose major threats to global supply chains, the rule of law and sustainable development. Tackling criminal activities in the mining sector requires an international and coordinated policing response  

Paria: INTERPOL, 2022.   20p.

Social Media's Dark Side in Online Radicalization

By Noor Huda Ismail

Online radicalization is a complex issue characterized by the different roles of digital propagandists and potential perpetrators, as highlighted by the recent security threats surrounding the Pope's visit to Indonesia. To combat this threat effectively, we need to prioritize real-time monitoring and interdisciplinary collaboration, utilizing AI tools to analyze and mitigate extremist content while advocating targeted interventions instead of punitive measures. Addressing radicalization necessitates collective societal action and a significant investment of relevant resources.

S. Rajaratnam School of International Studies, NTU Singapore, 2024. 4p.

“I’ve seen horrible things”: Children’s experiences of the online world

By The Children's Commission for England...

“I think the Government should do more about protecting children on the internet. Of course, it is very hard but just educating about the dangers of the internet is not enough” – Girl, 17. A year has passed since the Online Safety Act 2023 became law. This Act, a landmark piece of legislation, was welcomed by the Children’s Commissioner, following her extensive campaigning, as an important step towards a new era of the online world: one that presented an opportunity for children to learn, play and develop there safely. One year on, the legislation has yet to be implemented and important decisions regarding what those regulations will look like remain unclear. This report illustrates the extent to which children are still experiencing harm online. It sets the Children’s Commissioner’s expectations for the future of online safety policy making, and bolder steps towards robustly protecting children online. This report draws on the responses of 253,000 children and adults to The Big Ambition: a large-scale consultation of children in England carried out between September 2023 and January 2024. 2 The survey asked a broad set of questions about their lives, and in response, children shared their views on what they think needs to change to make their lives better. One of the areas they wanted action on was online safety. Children told the Children’s Commissioner’s Office that some children are more vulnerable to online harms than others, and that a variety of content and non-content factors cause them harm online. They also shared their views on who should take responsibility and make the online world safer for them. This report sets out what they said:

London: The Children's Commissioner for England, 2024. 80p.

Criminal Street Gangs and Domestic Sex Trafficking in The United States: Evidence From Northern Virginia 

By Yulia Krylova  and· Louise Shelley

The last decade witnessed increasing involvement of criminal street gangs in domestic sex trafficking in the United States. This paper analyzes business models and practices of gang-controlled sex trafficking in Northern Virginia, based on the cases available from PACER, an electronic public access service of the United States federal court. This analysis shows that business models of gang-controlled sex trafficking have become more sophisticated, taking advantage of the globalized financial system, new technology, social media, and the increasing prevalence of illicit commerce in a digital world with greater connectivity. Gangs’ flexible structures combined with loyalty enforced among their members have shielded them from much law enforcement action. The analysis of different gangs involved in sex trafficking in Northern Virginia provides new insights into anti-trafficking policies and law enforcement responses tailored to their structures and modi operandi.

Crime, Law and Social Change, February 2023

Phishing Risks in a University Student Community

By Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias and Yuguang Ipsen

In an exploratory quasi-experimental study, 138 students recruited during a university orientation week were exposed to social engineering directives in the form of fake emails, or phishing, over several months in 2017. The study assessed the risks of cybercrime for students by observing their responses. Three types of scam emails were distributed that varied in the degree of individualisation: generic, tailored, and targeted or ‘spear’. The study explored the influence of scam type, cybercrime awareness, gender, IT competence and perceived internet safety on susceptibility to email scams.Although tailored and individually crafted email scams were more likely to induce engagement than generic scams, differences were not significant. Analysis of the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students.


Trends & issues in crime and criminal justice no. 587. Canberra: Australian Institute of Criminology. 2020. 16p.