Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Mexico’s Fight against Transnational Organized Crime

By R. Evan Ellis

The security environment in Mexico is characterized by a dangerous fragmentation of and competition among criminal groups that pushed the nation’s homicide rate to a record high of 22.5 per 100,000 in 2017, a 27.5 percent increase over the prior year.1 The nation, whose security and prosperity strongly impacts the United States through geographic proximity and associated flows of people, money, and goods (both licit and illicit), is at a critical juncture in its fight against transnational organized crime. Since Mexican President Felipe Calderón launched the “war against the cartels” in December 2006 with the deployment of the Mexican army into the state of Michoacán, the nation’s security forces have taken down the leaders of multiple powerful criminal groups and debilitated their organizations.2 In the process, the Mexican military, police, and other security institutions have evolved their institutional structures, modified both their strategy and their doctrine, and strengthened their ability to combat transnational organized crime. Yet as with the experience of the United States in combatting terrorist groups in Iraq and Afghanistan, Mexico’s fight against the cartels, both despite and because of its successes, has created a more chaotic criminal landscape, with both a higher level of violence and a broader range of criminality.

Complicating Mexico’s security challenge is the disposition of the Trump administration to act aggressively against illegal immigration from Mexico (among other countries) into the United States, along with U.S. renegotiation and possible abandonment of the North American Free Trade Agreement. These actions increase stressors on Mexico, including the prospect of expanded deportations of immigrants to Mexico, the loss of remittance income, and impeded access by Mexican producers to the U.S. market. The Trump administration’s actions, magnified by rhetoric that many Mexicans perceive as an insult to their country and people, have combined with Mexican frustration over the persistence of violence and corruption to create the real prospect that leftist populist candidate Andrés Manuel López Obrador could win the July 2018 presidential election, potentially taking Mexico on a course of more distant political relations and decreased security cooperation with the United States and expanded engagement with extra-hemispheric rivals of the United States such as Russia and China.

This article examines Mexico’s serious and evolving security challenges, and the key initiatives and critical issues confronting the nation’s security forces. It argues that the Mexican government has made important progress against a range of criminal groups and in innovating and strengthening its own capabilities to combat such entities and associated flows of illegal goods—capabilities that deserve to be recognized, further refined, and exploited in partnership with the United States and Mexico’s other neighbors. It concludes with recommendations for U.S. policy makers regarding the importance of strong and respectful support for Mexico at the present critical juncture.

2028. 13p.

Women and Illicit Finance in Russia’s Occupation of Ukraine Orly Stern Olivia Allison

Addressing police and military involvement in serious organised crime (Research Paper 39)

CONVERGENCE: Illicit Networks and National Security in the Age of Globalization

By Michael Miklaucic and Jacqueline Brewer

I llicit networks affect everyone in our modern, globalized world. From human trafficking in Eastern Europe to drug smuggling in East Asia, to the illicit arms trade in Africa, to terrorist cells in East Asia and insurgents in the Caucasus, transnational illicit networks have tentacles that reach everywhere. The trade in illegal narcotics is perhaps most worrisome, but of growing concern is the illicit trafficking of counterfeit items, weapons, natural resources, money, cultural property, and even people by shrewd, well-resourced, and nefarious adversaries. I have experience combating these threats personally at the tactical, operational, and strategic levels. As a young naval officer on a variety of ships, I spent a fair amount of time patrolling the global commons where transnational criminals in the guise of pirates and drug smugglers proliferate. I was in the Pentagon on 9/11 and personally experienced the global reach of modern terrorism. Later on, when I commanded U.S. Southern Command (USSOUTHCOM), one of my subordinate commands was Joint Interagency Task Force–South in Key West, Florida, a multinational and interagency/interministerial command that counters drug trafficking in the Western Hemisphere. I also experienced the pernicious effects that transnational crime has on our friends as it ranges throughout the entire Western Hemisphere. After leaving USSOUTHCOM to become commander at U.S. European Command (USEUCOM), I saw that Europe was also challenged by the same types of transnational crime. In response, I stood up the Joint/Interagency Counter Trafficking Center in Stuttgart, Germany, designed to counter transnational criminal networks in cooperation with our international partners. When I took command of USEUCOM, I also became the Supreme Allied Commander, Europe (SACEUR). As SACEUR, I command Operation Active Endeavor, which counters trafficking in the Mediterranean, and Operation Ocean Shield, which is part of the international counterpiracy efforts off the Somali coast. In addition, we have pioneered responses to cyber threats. At the Supreme Headquarters Allied Powers Europe, we have the North Atlantic Treaty Organization Computer Incident Response Center, and at USEUCOM, we are taking steps to create a subunified cyber command that will have links to both U.S. Cyber Command in the United States and USEUCOM in Germany. All of these organizations were designed to facilitate a whole-of-government approach, where all elements of national power work together in order to address emerging threats. Eventually, once societies understand the nature of the threats facing them, they will hope- fully mobilize nongovernmental assets, adopting a “whole of society” approach. When all of these elements work together, governmental and nongovernmental groups can join international regional and global groups to form a “whole of international society” approach, allowing us to close the seams that exist between nations and regions. Only then will we be able to close these illicit transnational networks. These networks have taken advantage of modern advances in communications and transportation to globalize. Narcotraffickers in the Andean Ridge, for instance, have expanded operations as far as their markets in the United States and Europe. Illegal arms merchants have expanded their operations around the world. Human smugglers have moved their slaves from underdeveloped countries to sex operations throughout the developed world. And, of course, we have all seen the global reach of modern transnational terrorism. No one is immune from this insidious threat. 


Center for Complex Operations Institute for National Strategic Studies By National Defense University Press Washington, D.C., 2013. 304p.

Paradise Lost? Ecuador’s Battle with Organised Crime

By The International Crisis Group

What’s new? Once one of South America’s safest countries, Ecuador has in under a decade become its most violent, transforming into a hub of the drug trade to Europe. President Daniel Noboa’s iron-fist approach brought murder rates down at first, but violence has since soared again and crime continues unabated.

Why does it matter? Ecuador’s authorities have declared the country to be in the grip of internal armed conflict, deploying soldiers to prisons and crime-hit communities. With no sign of violence falling, the government is set to double down on its tough approach, expanding cooperation with the U.S. military and private security contractors.

What should be done? Crackdowns send a strong message to communities and criminals alike, but alone they tend not to overwhelm drug markets. Ecuador should do more to bring state services and licit economic opportunities to crime-hit neighbourhoods while quelling the corruption in ports, prisons and the state that helps generate the crime wave.

Brussels: International Crisis Group, 2025. 52p.

Mercenary Meltdown -The Wagner Group’s Failure in Mali

By The Sentry

The first Wagner Group fighters arrived in Bamako in January 2022 to assist the Malian military junta in its counterterrorism campaign.1 Three and a half years later, the group has announced its withdrawal from Mali to make space for Africa Corps with the statement “Mission accomplished.”2 But as the number of Wagner fighters in Mali will stay roughly the same, since many had already signed contracts with the Russian state prior to the announcement,3, 4 the group’s claim to success—and their overall strategy in Mali—merits scrutiny. Despite the Wagner Group possessing a reputation for being battle-ready and claiming occasional public triumphs in Mali, its strategy has been plagued by a series of failures.5 Wagner forces have been unable to take control of areas in the north and center of the country where armed terrorist and separatist groups are challenging the authority of the Malian state. There has been a significant increase in attacks on civilians and in civilian casualties since Wagner’s arrival in Mali, and this, in turn, has severely undermined relations between the Malian military and the Malian public. Faced with challenges such as insufficient air support, a lack of trust, and a lack of reliable information from informants, the Wagner Group has become more reactive and violent—allowing the very terrorist groups they were hired to neutralize to gain more control and increase recruitment in Mali. Wagner’s playbook in Mali has not only affected the civilian population; it has also helped perpetuate insecurity and has paved the way for the fragmentation of the Malian state. Wagner fighters have created chaos and fear within the Malian military hierarchy, forcing the Forces Armées Maliennes (Malian Armed Forces, or FAMA) to remain silent in cases of civilian abuse. In addition, the lack of order and communication within the chain of command has led to the progressive deterioration of the FAMA’s ranks. Abuses against the Malian armed forces by Wagner troops have increased, as have complaints from Malian soldiers. Within the Malian military junta itself, the varying degrees of partnership with Russian actors are contributing to a shift in power relations in Bamako, as Malian leaders regard one another with suspicion. Despite official discourse suggesting that Wagner and Russia are reliable partners in the Malian conflict, the Wagner command in Mali has demonstrated a reluctance to intervene militarily—even in cases where the capital is directly threatened—without first having assurances of financial compensation. At the outset of its Malian venture, Wagner was seeking to secure mining concessions that would likely replicate the group’s self-funding arrangements in other countries. However, the Malian junta appears unwilling to allow Wagner to control the mining sector, and Wagner’s forays into that sector have thus far been limited. Ultimately, the Wagner Group has failed in its task of eliminating terrorist groups in Mali. The Russian presence is instead creating upheaval amid the Malian military and causing rifts within the Malian junta. And as Wagner has seemingly gone unpaid for months and failed to obtain access to lucrative natural resources, its deployment in Mali has not been a worthwhile investment for any party involved. Wagner is not an infallible actor. If anything, the Malian example illustrates that the group can fail, and this should be a warning to other African clients who are considering hiring Wagner—or its more officialoffshoot, Africa Corps. At the same time, policymakers in the Global North should see Wagner’s failures as an opportunity for alternative policy approaches in the Sahel region. Key recommendations • The Office of the Prosecutor at the International Criminal Court (ICC) should open an investigation into war crimes perpetrated by Wagner troops in Mali and prosecute those responsible for human rights abuses. Alternatively, the United Nations Security Council should refer Wagner abuses in Mali to the Office of the Prosecutor at the ICC. • The government of Mali should take steps toward criminal accountability and reparations for the victims of massacres such as Moura, as well as for the abuses against and displacement of civilian populations following attacks by the Wagner Group in the north and west of the country. • The EU, the US, the UK, Canada, and Australia should investigate and, if appropriate, designate for sanctions the network of individuals and entities in Sadio Camara’s inner circle who enable, support, or benefit from Wagner’s presence in the country, as well as those involved in corruption and human rights abuses. They should coordinate sanctions to increase their impact. • International mining companies operating in Mali and foreign refineries processing Malian gold should conduct comprehensive audits of their operations to ensure that they are not conducting business with sanctioned Wagner Group entities or individuals, such as Ivan Maslov. • The Algerian government should facilitate renewed negotiations on a peace agreement between Bamako and the northern rebel groups. As the political and security landscape has changed since the 2015 agreement, which was facilitated by Algeria, including as a result of the withdrawal of the UN peacekeeping operation MINUSMA, new terms will need to be agreed.

The Sentry, 2025. 55p.

Decoding the EU’s most threatening criminal networks

By Europol

All EU Member States and 17 of Europol’s partner countries contributed data to identify the most threatening criminal networks in Europe. This resulted in a unique dataset of 821 most threatening criminal networks, with extensive information on all aspects that describe them and help assess their threat.

This mapping report is one of the key deliverables of the Belgian presidency of the Council of the European Union, which strongly encouraged the efforts of Europol in this respect. It will be an essential tool to fight organised crime going forward, which is a top EU priority, as outlined in the recent roadmap presented by the European Commission.

Publications Office of the European Union, Luxembourg, 2024. 60p.

The Darkest Shade of Green: Climate Change, Terrorist Organizations, and the Battle for Environmental Legitimacy

By Ashton Kingdon


Based on the combination of online observation, content analysis, as well as comparative and statistical analysis, this paper discusses the scale and structure of al-Qaeda’s and Islamic State’s propaganda output on the surface web. It explores qualitative and quantitative trends detectable in their propaganda between July and December 2023. This paper shows that during this period, the Islamic State released almost twice as many propaganda items on the surface web compared to al-Qaeda. Collected data indicates that the IS’s media production capability improved compared to its online crisis experienced around 2018. The recovery is, however, limited and caused primarily by efforts of the pro-IS media operatives, who are engaged in mass translation and reproduction of official releases of this violent extremist organization (VEO). Among al-Qaeda branches active on the surface web in the second half of 2023, Harakat al-Shabaab al-Mujahidin and media offices that support al-Qaeda in the Indian Subcontinent demonstrated the most remarkable capabilities in strategic communication. This paper also proves that both al-Qaeda and the Islamic State manifested significant interest in the events taking place in Africa, Central Asia, and Palestine. However, they frequently adopted opposing ways of framing them.


 

Studies in Conflict & Terrorism 2025.

Digital Aftershocks: Online Mobilization and Violence in the United States

By MARIANA OLAIZOLA ROSENBLAT AND LUKE BARNES


Political violence in the United States has increased in recent years and shows no signs of declining.1 This trend was underscored in September 2025 by the assassination of conservative activist Charlie Kirk at Utah Valley University. In the two weeks before and after Kirk’s killing, shooting incidents in Colorado, Minneapolis, and Dallas seized public attention.2 Executive Summary Amid growing concern about the relationship between online rhetoric and real-world violence, this report examines how violent extremist actors across the ideological spectrum use digital platforms to respond to, amplify, and exploit acts of political violence in the United States. Drawing on opensource intelligence (OSINT) gathered initially from March 24 to June 6, 2025, and then extended to include a period following Kirk’s assassination, this analysis reveals sophisticated cross-platform strategies employed by far-right, far-left, violent Islamist, and nihilistic violent extremist (NVE) actors. This report uses “violent extremist” to refer to individuals who support or commit ideologically motivated violence to further political goals, as well as those who commit violence driven by generalized hatred rather than a coherent ideology. Key Findings • Violent extremist groups systematically exploit trigger events—high-profile incidents of violence—to recruit supporters, justify their ideologies, and call for retaliatory action. • These groups employ multi-platform strategies, using mainstream sites like X for visibility and recruitment while maintaining a presence on private or semi-private platforms for coordination and more extreme content. • Far-right groups capitalized on cases like the Austin Metcalf stabbing and the Iryna Zarutska killing to advance narratives of White victimhood and justify threats against perceived enemies. • Activities of both far-left and far-right networks revealed a troubling convergence around antisemitic targeting. • Violent Islamic groups are more aggressively monitored than domestic groups espousing similar levels of violence. • Violent Islamist groups, facing stricter moderation than domestic extremists, have migrated to decentralized platforms like Rocket.Chat while disseminating symbolic propaganda elsewhere. • Nihilistic Violent Extremist (NVE) communities glorify violence across ideological lines for shock value and digital notoriety, making their threats harder to predict based on political triggers. This report aims to bring clarity to a conversation clouded by vagueness and partisanship. It first maps the domestic threat landscape, offering timely examples of online violent discourse from across the ideological spectrum targeting US individuals or institutions, and sets out a clear definitional framework for types of speech that carry legal significance under US constitutional doctrine. It closes with practical recommendations for online service providers and policymakers.


New York: NYU Stern Center for Businsss, 2025. 36p.

A comparison of political violence by left-wing, right-wing, and Islamist extremists in the United States and the world

By Katarzyna Jaskoa, Gary LaFree, James Piazzac , and Michael H. Beckerd



Although political violence has been perpetrated on behalf of a wide range of political ideologies, it is unclear whether there are systematic differences between ideologies in the use of violence to pursue a political cause. Prior research on this topic is scarce and mostly restricted to self-reported measures or less extreme forms of political aggression. Moreover, it has generally focused on respondents in Western countries and has been limited to either comparisons of the supporters of left-wing and right-wing causes or examinations of only Islamist extremism. In this research we address these gaps by comparing the use of political violence by left-wing, right-wing, and Islamist extremists in the United States and worldwide using two unique datasets that cover real-world examples of politically motivated, violent behaviors. Across both datasets, we find that radical acts perpetrated by individuals associated with left-wing causes are less likely to be violent. In the United States, we find no difference between the level of violence perpetrated by right-wing and Islamist extremists. However, differences in violence emerge on the global level, with Islamist extremists being more likely than right-wing extremists to engage in more violent acts.



Political violence in the United States has increased in recent years and shows no signs of declining.1 This trend was underscored in September 2025 by the assassination of conservative activist Charlie Kirk at Utah Valley University. In the two weeks before and after Kirk’s killing, shooting incidents in Colorado, Minneapolis, and Dallas seized public attention.2 Executive Summary Amid growing concern about the relationship between online rhetoric and real-world violence, this report examines how violent extremist actors across the ideological spectrum use digital platforms to respond to, amplify, and exploit acts of political violence in the United States. Drawing on opensource intelligence (OSINT) gathered initially from March 24 to June 6, 2025, and then extended to include a period following Kirk’s assassination, this analysis reveals sophisticated cross-platform strategies employed by far-right, far-left, violent Islamist, and nihilistic violent extremist (NVE) actors. This report uses “violent extremist” to refer to individuals who support or commit ideologically motivated violence to further political goals, as well as those who commit violence driven by generalized hatred rather than a coherent ideology. Key Findings • Violent extremist groups systematically exploit trigger events—high-profile incidents of violence—to recruit supporters, justify their ideologies, and call for retaliatory action. • These groups employ multi-platform strategies, using mainstream sites like X for visibility and recruitment while maintaining a presence on private or semi-private platforms for coordination and more extreme content. • Far-right groups capitalized on cases like the Austin Metcalf stabbing and the Iryna Zarutska killing to advance narratives of White victimhood and justify threats against perceived enemies. • Activities of both far-left and far-right networks revealed a troubling convergence around antisemitic targeting. • Violent Islamic groups are more aggressively monitored than domestic groups espousing similar levels of violence. • Violent Islamist groups, facing stricter moderation than domestic extremists, have migrated to decentralized platforms like Rocket.Chat while disseminating symbolic propaganda elsewhere. • Nihilistic Violent Extremist (NVE) communities glorify violence across ideological lines for shock value and digital notoriety, making their threats harder to predict based on political triggers. This report aims to bring clarity to a conversation clouded by vagueness and partisanship. It first maps the domestic threat landscape, offering timely examples of online violent discourse from across the ideological spectrum targeting US individuals or institutions, and sets out a clear definitional framework for types of speech that carry legal significance under US constitutional doctrine. It closes with practical recommendations for online service providers and policymakers.


PNAS 2022 Vol. 119 No. 30 e2122593119

When Minors Become Targets of Violent Extremist Groups

By Noor Huda Ismail

SYNOPSIS

The increasing susceptibility of minors to recruitment by violent extremist groups via online platforms poses a clear and present danger. Cases in Singapore and Indonesia illustrate how radicalisation exploits factors such as identity crises, wounded masculinity, and digital isolation. Emphasis on rehabilitation as opposed to punishment is critical, necessitating the involvement of families, schools, and communities to safeguard children through fostering trust and empathy.

COMMENTARY

As a father of two teenage boys, aged 16 and 14, I cannot read the news of radicalised minors without feeling alarmed and deeply concerned. The recent case in Singapore, involving a 14-year-old student, is particularly striking.

 

Security officials reported that the boy was influenced by a “salad bar” of extremist beliefs, including ISIS propaganda, incel subculture and those on the far-right and far-left. He is not much older than my youngest child, who, like millions of teenagers, spends hours on gaming, social media, and online communities that quietly shape their identity, sense of belonging, and moral compass.

 

For the unfamiliar, incel stands for “involuntary celibate”. These are mostly young men, expressing deep resentment toward women and society for their sexual frustrations. From a gender perspective, incel ideology feeds on what scholars call wounded masculinity.

 

Many boys today struggle with identity in a world where traditional markers of male success – financial stability, social recognition, romantic relationships – are increasingly uncertain. Online platforms amplify these feelings, creating spaces where humiliation and anger are validated, sometimes evolving into misogyny or even violence.

The past, present and future of organised crime

The 2025 Africa Organised Crime Index, published on 17 November by the ENACT project, provides an overview and analysis of the past, present and future of organised crime across the continent. In its fourth and final iteration, the 2025 Index draws on the knowledge of over 160 experts. It combines eight years of qualitative and quantitative data to provide an assessment of how organized crime and resilience have evolved in Africa. It also examines ongoing challenges, including the impact of technology and geopolitical dynamics on organized crime. The ENACT project is implemented by a consortium of the Institute for Security Studies (ISS), INTERPOL and the Global Initiative Against Transnational Organized Crime (GI-TOC).

“Eight years of data and four issues of the Africa Organised Crime Index provide a rich pool of information that gives us an unprecedented overview of illicit economies across the continent”, says Mark Shaw, Executive Director of GI-TOC. “Thanks to the ENACT research programme and our cooperation with the ISS, we have pioneered a methodology for measuring organized crime first in Africa, which has now been scaled up to a Global Organized Crime Index produced every two years”.

"This has been an innovative flagship project," says Eric Pelser, ENACT Programme Head at the ISS. "Our partnership with GI-TOC has produced in-depth analysis that goes beyond research – we've taken the recommendations emanating from the Africa Index to the highest levels of policy-making, ensuring that evidence drives action across the continent."

Key findings:

  • There has been a steady growth in criminal markets and criminal actors in Africa since 2019. 
     

  • In 2025, the most pervasive criminal markets in Africa are financial crimes, human trafficking, non-renewable resource crimes, the trade in counterfeit goods and arms trafficking. Since 2023, the two fastest-growing markets have been financial crimes and the trade in counterfeit goods, reflecting broader global patterns.
     

  • Criminal markets in Africa today show considerable diversity across the continent. East Africa stands out for its high human trafficking, arms trafficking, and human smuggling scores, which drive the continental averages. In North Africa, financial crimes and cannabis trade are the most pervasive criminal markets, placing the region second and first (respectively) in the world for these illicit economies. Non-renewable resource crimes were found to exert significant influence in Central Africa, while the cocaine trade dominates West Africa’s illicit economy. In Southern Africa, wildlife trade was found to be among the most prevalent criminal markets.   
     

  • State-embedded actors are the most prevalent type of criminal actor across the continent, with their influence in nearly half of African countries (48%) classified as “severe”. 
     

  • Foreign criminal groups pose an increasingly significant threat to the continent. Their influence in West Africa was found to be “significant to severe” in all but one country in the region. This reflects the impact of transnational cocaine trafficking as well as private military companies engaged in illicit activities.
     

  • Africa’s digital boom has provided new opportunities for criminal actors, both to expand and diversify traditionally non-digital markets and to grow new criminal markets, such as online financial fraud and ransomware. As in other regions of the world, cyber-dependent crime is increasing in many parts of Africa – particularly Kenya, South Africa and Nigeria, with four out of the five subregions witnessing a rise in this crime type.
     

  • Criminality thrives in volatile environments. States and regions where conflicts, insurgency and violent extremism persist are magnets for organized crime. Many countries in Africa that have the highest criminality scores are wracked by conflict and instability: there is a relatively high (0.59) correlation between the Fragile States Index and criminality. This phenomenon needs to be factored into peacemaking and peacebuilding.
     

  • Governance was found to have a strong impact on resilience to organized crime, with the data showing a strong (0.81) correlation between Africa’s resilience and the Democracy Index. While democratic countries are vulnerable to organized crime, they are also more resilient in their response to it. In contrast, authoritarian states tend to either embrace organized crime or suppress it with violent crackdowns.
     

  • Geopolitics has a negative impact on illicit economies, drawing on the continent’s resources and role in the global landscape. For example, the withdrawal or expulsion of some foreign powers has created a vacuum for both licit and illicit actors to fill, generating instability and the growth of illicit activity in some cases.
     

  • There has been a steady decline in resilience to organized crime in most African countries since 2019. Almost all countries in Africa (92.5%) are characterized as having low resilience to organized crime. Of these, 23 countries are affected by high criminality, creating a particularly vulnerable combination of high criminality and low resilience.
     

  • Africa’s resilience ranks among the lowest in the world, indicating insufficient capacity to respond to the criminal threats the continent faces. One key resilience measure is that ‘non-state actors’ play a vital role by supporting vulnerable communities and holding authorities to account. Civil society organizations are often at the forefront of leading social protection efforts. However, since the 2021 Index, the ‘nonstate actors’ resilience indicator has declined the most

The Evolution of Threat Networks in Latin America

By Phil Williams and Sandra Quincoses

The economic and political environments in Latin America have been advantageous for local, regional, and transnational threat networks. Specifically, technology, increased international trade and economic interdependence, heightened interest in natural resources for profit, synthetic drug production, economic disparities, corruption, impunity, and unstable political conditions have led to a complex web of opportunities that requires new, progressive ways to address criminal activities. The creativity of threat networks along with their entrepreneurial strategies have resulted in increasing power and influence. Despite efforts by the United States and some governments in Latin America to combat these networks, the everchanging global environment has worked in their favor. Indeed, some countries in Central and South America are in danger of transforming into what Jorge Chabat described as “criminally possessed states.” Furthermore, gangs in Central America, especially in Honduras where MS-13 has become more closely linked to drug trafficking, have reduced local extortion, become more aware of their nascent political power and have even engaged in rudimentary social welfare provision.

Fishing For Security. Taking on Illegal Fishing in Latin America

By Daniel Schaeffer



Often viewed through a myopic lens as an environmental issue or one relegated to fisheries authorities, illegal, unreported, and unregulated (IUU) fishing affects all coastal nations in the Western Hemisphere and has national security implications on the United States. A regional problem requires a regional solution and greater cooperation across agencies, private industry, and governments. Actions to address IUU fishing in Latin America have the potential to achieve greater aims of maritime security in the region. The report will frame the problem of IUU fishing by first highlighting its overall impacts globally and regionally. Food security, employment, national revenue, and other illicit activities are discussed. The report concludes with recommendations for interagency and regional coordination.



Miami:2021. 



Maritime security in Africa’s Western Indian Ocean

By Daniela Marggraff

From piracy to illegal fishing, maritime threats in the region demand urgent, coordinated policy action.

The Western Indian Ocean contains a multitude of threats to inhabitants’ maritime security, ranging from climate change and pollution to piracy, illegal, unreported and unregulated fishing, maritime violence and increasing militarisation. This report emphasises a policymaking approach that addresses issues through a cyclical rather than linear lens, recognising how one threat can lead to the emergence of another.

Pretoria, South Africa: Institute for Security Studies, 2025. 24p.

Children, Digital Risk, and the Future of Terrorism Prevention in Indonesia

By Noor Huda Ismail


Indonesia is witnessing a disturbing rise in the online radicalisation of minors, with police confirming that 110 children aged 10-18 have been influenced or recruited by extremist networks in twenty-three provinces. The challenge in countering this trend lies in understanding why the phenomenon is intensifying and what it would demand from policymakers, particularly in involving the youth themselves in co-creating prevention strategies.

COMMENTARY

Recent disclosures from the Indonesian National Police underscore an unsettling shift in the country’s counter-terrorism landscape. Brigjen Polisi Trunoyudo Wisnu Andiko reported that 110 minors aged 10 to 18 have been exposed to radical ideology and recruited into terrorist networks, with the highest concentrations in Banten, DKI Jakarta, West Java, Central Java, and East Java.

 

The recruitment of these minors is a subtle, highly digitalised process, beginning on social media platforms such as Facebook and Instagram, and through online games, before moving to private channels like WhatsApp and Telegram. Extremists employ short videos, animations, memes, and music that resonate with adolescent culture, embedding ideology within content designed for entertainment and identity formation. This approach allows gradual indoctrination, exploiting both the cognitive vulnerabilities of youth and the emotional allure of belonging to a community.


S. Rajaratnam School of International Studies, NTU Singapore, 2025. 

Flying Money, Hidden Threat: Understanding the Growth of Chinese Money Laundering Organisations

By Kathryn Westmore

Within a relatively short period of time, Chinese money laundering organisations (CMLOs) have become one of the pre-eminent global money laundering threats. Using centuries-old techniques, modern-day CMLOs have evolved into multi-billion-dollar operations, providing quick, cheap and efficient money laundering services to transnational organised crime groups (OCGs). In some countries, such as the US, CMLOs have come to dominate the market, and their activities are growing in the UK and Europe. This paper seeks to explore the reasons why CMLOs have become so successful and how their activities have developed. It identifies that the imposition of strict capital controls by China has created a demand from wealthy Chinese individuals for ways in which they can move money out of the country to access Western currencies. CMLOs are able, for a fee, to provide this from the funds that they launder on behalf of transnational crime groups. CMLOs also take advantage of large Chinese diaspora populations both as potential clients and as part of their operations; for example, through the recruitment of “money mules” to deposit criminal proceeds into bank accounts controlled by the CMLOs. These factors, combined with OCGs’ increasing demand for “professional” money laundering services and the involvement of Chinese groups in the fentanyl drug trade, have created the perfect conditions for CMLOs to flourish. This paper goes on to apply a “state threats” lens to the activities of CMLOs, building on the work of researcher and risk consultant Matthew Redhead,1 to inform readers how countries in the West could respond to the threat. Ultimately, the research concludes that there is no evidence to suggest that the activity of CMLOs is being directed by the Chinese state. While there is evidence that Chinese money laundering schemes can, and do, involve Chinese government officials and members of the Chinese Communist Party, that is very clearly not the same as saying that the schemes are state directed. This conclusion, therefore, prompts a follow-up question, which the paper explores, as to the prospect of collaboration between the West and China in tackling CMLO activity. 

SOC ACE Research Paper 36. University of Birmingham. 2025. 34p.

Disorder policing to reduce crime: An updated systematic review and meta-analysis

By Anthony A. Braga, Cory Schnell Brandon C. Welsh


 Broken windows theory suggests that police can prevent serious crime by addressing social and physical disorder in neighborhoods. In many U.S. cities, recent increases in disorder, fear, and crime have initiated calls for an intensification of disorder policing efforts. Disorder policing programs can be controversial, with evaluations yielding conflicting results. Further, a growing number of descriptive analyses of aggressive order maintenance programs raise concerns over varied negative consequences, such as increased racial disparities in arrests of citizens. Systematic review and meta-analytic techniques were used to conduct an updated analysis of the effects of disorder policing on crime. Fifty-six eligible studies including 59 independent tests of disorder policing interventions were identified, representing almost twice the number included in the previous review. As part of the meta-analysis, new effect size metrics were used. The updated meta-analysis suggests that policing disorder strategies are associated with overall statistically significant crime reduction effects that spill over into surrounding areas. The strongest program effect sizes were generated by community and problem-solving interventions designed to change social and physical disorder conditions at crime  hot spots. Conversely, aggressive order maintenance strategies did not generate significant crime reductions. Policy Implications: The types of strategies used by police departments to address disorder seem to matter in controlling crime, and this holds important implications for police–community relations, justice, and crime prevention. Further research is needed to understand the key programmatic elements that maximize the capacity of these strategies to prevent crime


Criminology & Public Policy. 2024;23:745–775 

Supporting Effective Policing by Lebanon’s Embattled Security Agencies

By The International Crisis Group


What’s new? Since October 2019, Lebanon’s economic crisis has gutted funding for the country’s security forces, including the army and national police. Overstretched, these agencies have resorted to makeshift solutions for keeping the peace, including initiatives that allow communities to help police themselves.

Why does it matter? With the country’s security institutions struggling for resources, public safety in Lebanon is maintained by a patchwork of ad hoc solutions and quick fixes that cannot hold forever. As formal institutions continue to weaken, security will fray. Violence could follow, particularly in neglected and impoverished areas.

What should be done? Donors should keep pressing Lebanon’s leaders to better address the economic crisis so that the government can reinvest in the security forces’ long-term viability, especially after the latest destabilising Israel-Hizbollah war. In parallel, targeted interventions by donors can help bolster the security forces’ performance and professional integrity.

Brussels, Belgium : International Crisis Group, 2025. 49p.

Addressing Violence Against Women: The Effect of Women’s Police Stations on Police Legitimacy

By Abby Córdova and Helen Kras

 With a focus on the implementation of women’s police stations (WPS), we posit that local policies that address violence against women can result in positive feedback effects on institutional legitimacy. We theorize that WPS increase police legitimacy among women by improving perceptions of personal safety and government responsiveness. To test our hypotheses, we rely on municipal and public opinion data from more than 100 municipalities in Brazil. The results of our multilevel analysis indicate that WPS produce positive feedback effects among women, resulting in higher trust in the police among women than men and closing the gender gap in perceptions of police effectiveness. Incorporating an instrumental variable in the analyses yields similar results, suggesting that these effects are not endogenous. Moreover, the results of our mediation models show that WPS’ positive effects on women’s views of police legitimacy are driven by improved perceptions of personal safety, and not perceptions of government responsiveness. 

Comparative Political Studies 2020, Vol. 53(5) 775–808 

Urban youth violence: Do definitions and reasons for violence vary by gender?

By Michael A Yonas ,, Patricia O’Campo , Jessica G Burke , Geri Peak , Andrea C Gielen 

This study explored how young boys and girls living in low income urban neighborhoods defined and described reasons associated with youth violence. Five focus groups were conducted with 29 youth between the ages of 8 and 12 recruited from four selected study neighborhoods. Participants were asked to describe youth violence. Appropriate probes were used to explore similarities and differences by gender with regard to the reasons for violence. Definitions of youth violence were consistent across participants and included verbal threats, physical contact, and often the use of a weapon. Several common reasons for violence were found among both boys and girls; romantic relationships, respect, idle time, gangs.cliques, and witnessing violence. Reasons for violence unique to boys include fighting about issues related to money and illicit drugs. Gossip was identified as a reason specific to why girls engage in violence. Youth violence was perceived as a common problem impacting the lives of the boys and girls in this study. Although many of the reasons identified for violence are similar among boys and girls, select gender differences do exist. Future research and prevention efforts to address youth violence should engage young people in efforts to understand and address this important public health topic.

J Urban Health

. 2005 Dec;82(4):543–551.

Experience of Intimate Partner Violence and Non-Partner Sexual Violence in Conflict-Affected Settings: A Systematic Review and Meta-Analysis

By Maureen Murphy , Emily R Smith , Shikha Chandarana , Mary Ellsberg 

This review aims to contribute to the understanding of violence against women and girls in conflict-affected and fragile settings through a systematic review and meta-analysis to document the available evidence on the prevalence of intimate partner violence and non-partner sexual violence during periods of armed conflict and in post-conflict periods. A total of 45 studies were included. Inclusion criteria were: population-based, observational studies that collected quantitative data with women (aged 15 years or older), included prevalence data on intimate partner violence or sexual violence, was collected in a conflict-affected context (active conflict or within 10 years after conflict) and was self-reported by women themselves. PubMed (Medline), PsycINFO, and Scopus were searched, and Demographic and Health Surveys were included for conflict-affected settings. The search covered literature published between January 1990 and August 2023. The results estimate that 39% of women and girls in conflict-affected settings have experienced physical or lifetime IPV, while 24% reported this violence in the past 12 months. For non-partner perpetrated violence, an estimated 21% of women and girls had experienced this violence in their lifetime and 11% reported having this experience during a period of conflict. When looking at sexual violence overall, an estimated 21% had experienced this violence, though there was considerable heterogeneity depending on the source of this data.

Trauma Violence Abuse. 2024 Dec 24: