Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Firearm-related violence in the Caribbean is a complex systemic issue: how do we move towards a solution?

By Natasha P. Sobers, Joeleita Agard, Katrina Norville, Anne-Séverine Fabre, Nicolas Florquin, Callixtus Joseph, Madeleine Joseph, Maria Garcia-Joseph, Reginald King, Patrick Jason Toppin, Hugh Wong, Simon G. Anderson

In the Caribbean, gun violence has reached crisis levels and regional heads of government have called for a public health approach to inform prevention and control. Feedback loops resulting from work carried out under the ‘Pathway to Policy’ project showed that firearm-related crimes increased the chances of household poverty, national economic costs, deaths and disability and promoted a culture of violence, all of which reinforced gun violence. Interventions to reduce illicit access and use of firearms, social development programs, and investment in educational systems may balance rates of gun violence.

Firearm-related violence in the Caribbean is a complex systemic issue: how do we move towards a solution?—an article co-written with our project partners from the Caribbean Community Implementation Agency for Crime and Security, the Caribbean Public Health Agency, and the George Alleyne Chronic Disease Center at the University of the West Indies—discusses the work carried out by the Advisory Committee of Regional Experts, a multisectoral group convened to develop a ‘pathway to policy’ that informs a regional approach to tackling firearm violence. Using a systems mapping technique to inform our understanding of firearm-related crimes and injuries based on the expertise of stakeholders and based on analysis of publicly available data from thirteen countries within the Caribbean Community, this article calls for greater attention to the equilibrium between crime response strategies and prevention approaches.

Identity-Based Mass Violence in Urban Contexts: Uncovered

By Rachel Locke, Kelsey Paul Shantz, Andrei Serbin Pont, Jai-Ayla Sutherland
This open access book represents a multiyear exploration into identity-based mass violence (IBMV) within urban contexts. It explores the complexities of structural and acute violence in cities, drawing on local solutions rooted in the fields of urban violence prevention, atrocity prevention, and peacebuilding. The authors present a multidimensional approach that addresses sexual and gender-based violence, racial and ethnic violence, gang or group-based violence, state-perpetrated violence, political violence, violence against migrants, and others. The volume investigates the outsized influence of power in shaping how violence is understood and how prevention outcomes are evaluated. The chapters span scholarship, practical guidance, and lived experience of enduring and bearing witness to IBMV. This volume speaks directly to reform-minded partners and allies in policy and practice, as well as to funders and supporters. It provides a practical foundation for collaborative, prevention-focused action and policy opportunities.
Cham: Springer Nature, 2025. 

SELECTING AND VALIDATING OUTCOME MEASURES FOR THE DOMESTIC VIOLENCE AND ABUSE CORE OUTCOME SET (DVA-COS) 

By Jenna Harewell, Elizabeth Dunk Shivi Bains, Emma Howarth, Claire Powell, Lazaros Gonidis

  Background - The domestic abuse core outcome set (DVA-COS) is an agreed set of five outcomes intended for use in evaluations of interventions or services for children and families with experience of domestic violence and abuse (DVA, hereafter referred to as domestic abuse). A COS is a minimum standard for measurement in intervention studies, the purpose of which is to overcome heterogeneity in outcome selection and measurement. The aim of a COS is to maximise the value of a body of evidence by facilitating comparison between and synthesis across studies, thus reducing research wastage. Since the development of the DVA-COS, work has been undertaken to identify, select, and validate outcome measurement instruments (OMIs) to measure the core outcomes. The Warwick– Edinburgh Mental Wellbeing Scale (WEMWBS) was previously identified as acceptable by stakeholders to capture two outcomes: child and caregiver emotional health and wellbeing. This work seeks to extend those findings by validating the measure for use with domestic abuse experienced populations. Aims Foundations, the national What Works Centre for Children & Families, commissioned two work packages to develop and integrate previous work to outline and validate OMIs for use to assess outcomes comprising the DVA-COS. Work package 1 seeks to identify three OMIs, and this report focuses on work package 2, which aimed to validate the Short WEMWBS (SWEMWBS) for use with children and young people (aged 11 to 18) who have experienced domestic abuse. The studies that make up this work package used mixed methods to examine the acceptability, content validity, structural validity, internal consistency, and measurement invariance for the scale in children and young people experiencing domestic abuse. We also report a validation study of the WEMWBS for adults with experience of domestic abuse. Methods The above aims were addressed across four individual studies: two planned and two supplementary. First, a qualitative ‘think aloud’ study assessed the acceptability of the SWEMWBS with children and young people who had experienced domestic abuse. The remaining three studies were quantitative analyses of secondary data on using the SWEMWBS and WEMWBS with children and young people and adult samples. • Study A: a qualitative think aloud study that involved interviews and a focus group to gather feedback from children and young people with domestic abuse experience on use of the SWEMWBS. • Study B: examined cross-sectional data collected by the OxWell Student Survey to validate the SWEMWBS with children and young people affected by domestic abuse. • Study C: examined anonymised longitudinal service data to validate the SWEMWBS with children and young people affected by domestic abuse. • Study D: validated the WEMWBS with adults who have experienced domestic abuse using cross-sectional data from the Adult Psychiatric Morbidity Survey (APMS). Key findings Our findings demonstrate the validity and acceptability of the SWEMWBS and WEMWBS in domestic abuse-experienced child and adult populations respectively. Study A indicated that the SWEMWBS is broadly acceptable for use with children and young people, while raising important considerations regarding respondents’ interpretation of the measure’s items as well as the emotional impact of the measure on this population. Studies B and C demonstrated robust psychometric validity2 of the SWEMWBS with children and young people affected by domestic abuse, and Study D showed robust psychometric validity of the WEMWBS with adult victims of domestic abuse. These are significant findings given the limited number of measures that have been evaluated for use with this population across practice and research contexts. Moreover, this represents an important step forward in the implementation of the DVA-COS, which we hope will help to unify outcome measurement in domestic abuse research and evaluation, as well as service monitoring. Recommendations We recommend that the SWEMWBS and WEMWBS be used to measure wellbeing in the context of evaluation studies (of any quantitative design) seeking to assess the impact of child-focused domestic abuse interventions. To enhance the acceptability of the measure to children and adults we suggest minor adaptations for use in the domestic abuse context. Finally, we recommend the development of guidelines for practitioners and researchers about how to use the tools in a ‘carefirst’ way and how to guard against the tools being used for screening or triaging, or rationing care, as well as guidance for commissioners on how to interpret and use evidence, generated by the completion of the SWEMWBS and WEMWBS, for the basis of decision making. This guidance needs to reflect the balance between the benefits of data-driven decision making and the risk of unduly narrowing the breadth of services or thwarting innovation in the sector. The OMI’s implementation (including the use of guidance) should be closely monitored and evaluated, to inform any associated refinements and to develop an in-depth understanding of the process and outcomes associated with embedding routine measurement in practice. Further work is also required to identify an alternative OMI or adapt the SWEMWBS for appropriate use with children under the age of.   11.

Foundations UK: 2025. 106p.

  SELECTING AND VALIDATING OUTCOME MEASURES FOR THE DOMESTIC VIOLENCE AND ABUSE CORE OUTCOME SET (DVA-COS)

By Shivi Bains, Elizabeth Dunk, Lazaros Gonidis,  Jenna Harewell,Emma Howarth, Claire Powell

  Background - The domestic violence and abuse core outcome set (DVA-COS) is an agreed set of five outcomes intended for use in evaluating interventions for children and their families with experience of domestic abuse. The purpose of a core outcome set is to harmonise outcome measurement, helping to reduce variation in outcome selection and measurement across studies, with the aim of preventing research waste. This minimum, but not exclusive, set of outcomes also aims to ensure interventions capture impact meaningful to all stakeholders, whether through routine data collection within domestic abuse services or as outcomes in trials and research evaluations. Since the development of the DVA-COS, work has been undertaken to consolidate and validate outcome measurement instruments (OMIs) to use within the core outcome set. The work reported here builds on and extends these efforts (Powell, Clark, et al., 2022; Powell, Feder, et al., 2022). Aims Foundations, the national What Works Centre for Children & Families, commissioned a programme of work, comprised of two work packages, to develop and validate OMIs for use in the DVA-COS. This report focuses on work package 1, which sought to identify and appraise measurement tools, using the COnsensus-based Standards for the selection of health Measurement INstruments (COSMIN) Process, to assess three of the five core outcomes of the DVA-COS: family relationships, feelings of safety, and freedom to go about daily life. Work package 2 sought to validate the Short Warwick–Edinburgh Mental Wellbeing Scale (SWEMWBS) for use with child and young people populations with experience of domestic abuse and is reported separately. Methods To meet the aim of work package 1, this project adopted a four-stage process. Within stage A, OMIs were identified through rapid reviews of the domestic abuse literature (peer-reviewed and grey) and through targeted searches of the non-domestic abuse literature; these searches were informed by concept workshops with 15 key stakeholders to highlight priority concepts within the outcomes. In stage B, candidate OMIs and their associated studies were quality appraised, using the COSMIN protocol, and the highest-scoring tools were shortlisted for assessment of their acceptability and feasibility. Feedback workshops and stakeholder votes, held within stage C, determined which tools should proceed to the consensus workshop. Concluding this process (stage D), a consensus workshop was held with 29 domestic abuse practitioners, commissioners, researchers, and survivors to allow stakeholders to discuss and reach agreement on recommending OMIs for the three outcomes. Key findings In total 144 OMIs were identified across all evidence sources and from previous work. A systematic process of conceptual mapping, quality appraisal, and examination of acceptability and feasibility issues resulted in a shortlist of 18 OMIs (seven OMIs mapping to family relationships, six mapping to feelings of safety, and five capturing freedom to go about daily life) for discussion by three stakeholder groups. Of these, eight OMIs (three OMIs for family relationships, three for feelings of safety, and two for freedom to go about daily life) progressed to the final consensus workshop. Votes held during the consensus workshop identified the Children and Families Against Domestic Abuse (CAFADA) Wellbeing and Safety as the preferred OMI to assess two outcomes: family relationships (81.5%) and feelings of safety (74.1%). A provisional recommendation for use of this tool was agreed, given that it was recently developed and so it lacks psychometric validation. Therefore it is recommended that before widespread use, this OMI is subject to further adaptation and evaluation in cooperation with the tool developers. In particular, thought is needed about the tool’s suitability for a wider range of interventions, including those supporting perinatal families or services including the person that harms. No agreement, and therefore no recommendation, was reached for an OMI capturing freedom to go about daily life. Feedback from the consensus workshop highlighted a range of positive attributes that explained the CAFADA Wellbeing and Safety’s high acceptability for use within domestic abuse contexts, such as visually appealing design, trauma-informed and strengths-based language, and the complementary adult and child versions. The consensus workshop also highlighted key areas of development such as removing gendered language, being inclusive of non-traditional family structures, and being accessible to children of different ages or cognitive maturity. Conclusion This work makes important strides towards the realisation of a DVA-COS. It establishes a consensus with respect to the provisional recommendation for use of the CAFADA Wellbeing and Safety scale, in research and practice contexts, to assess feelings of safety and family relationships. This provisional recommendation is dependent on further work being carried out to refine the tool and to evaluate its implementation in real-world contexts and in relation to different types of childand family-focused interventions. The not insignificant challenges of implementing a core outcome set are discussed, including the importance of creating trauma-informed guidance to ensure the DVA-COS adopts a care-first approach and to mitigate any unintended consequences. Key findings In total 144 OMIs were identified across all evidence sources and from previous work. A systematic process of conceptual mapping, quality appraisal, and examination of acceptability and feasibility issues resulted in a shortlist of 18 OMIs (seven OMIs mapping to family relationships, six mapping to feelings of safety, and five capturing freedom to go about daily life) for discussion by three stakeholder groups. Of these, eight OMIs (three OMIs for family relationships, three for feelings of safety, and two for freedom to go about daily life) progressed to the final consensus workshop. Votes held during the consensus workshop identified the Children and Families Against Domestic Abuse (CAFADA) Wellbeing and Safety as the preferred OMI to assess two outcomes: family relationships (81.5%) and feelings of safety (74.1%). A provisional recommendation for use of this tool was agreed, given that it was recently developed and so it lacks psychometric validation. Therefore it is recommended that before widespread use, this OMI is subject to further adaptation and evaluation in cooperation with the tool developers. In particular, thought is needed about the tool’s suitability for a wider range of interventions, including those supporting perinatal families or services including the person that harms. No agreement, and therefore no recommendation, was reached for an OMI capturing freedom to go about daily life. Feedback from the consensus workshop highlighted a range of positive attributes that explained the CAFADA Wellbeing and Safety’s high acceptability for use within domestic abuse contexts, such as visually appealing design, trauma-informed and strengths-based language, and the complementary adult and child versions. The consensus workshop also highlighted key areas of development such as removing gendered language, being inclusive of non-traditional family structures, and being accessible to children of different ages or cognitive maturity. Conclusion This work makes important strides towards the realisation of a DVA-COS. It establishes a consensus with respect to the provisional recommendation for use of the CAFADA Wellbeing and Safety scale, in research and practice contexts, to assess feelings of safety and family relationships. This provisional recommendation is dependent on further work being carried out to refine the tool and to evaluate its implementation in real-world contexts and in relation to different types of childand family-focused interventions. The not insignificant challenges of implementing a core outcome set are discussed, including the importance of creating trauma-informed guidance to ensure the DVA-COS adopts a care-first approach and to mitigate any unintended consequences

Work Package 1.   

Foundations UK: 2025. 126p.



Assessment Of The Abuse and Dependence Potential Of New Psychoactive Substances: Synthetic Opioids

By The Laboratory and Scientific Services
United Nations Office on Drugs and Crime; 

The scientific evaluation of substances for inclusion in international and most national legislations requires an assessment of a range of chemical, pharmacological, and toxicological properties of a substance. Also, for many of the NPS that have emerged, quality comparable scientific data on these properties are either scarce or do not exist. The aim of these UNODC guidelines is to support Member States in the generation of quality scientific data on key pharmacological properties used in the scientific evaluation of substances, specifically the determination of the abuse and dependence potential of NPS. Given the continued emergence of highly potent synthetic opioids in recent years, this guideline will focus on synthetic opioids and future volumes will contain information on other groups of NPS.

Vienna: UNODC< 2025. 58p.

Does Regulating Drug Precursors Affect Illicit Drug Markets? An Expanded and Updated Systematic Review

By Luca Giommoni, Kirsty Stuart Jepsen, Shannon Murray

Background

Many countries are placing greater emphasis on regulating precursor chemicals used in illicit drug production. However, the latest review on this topic is 14 years old and limited to North American methamphetamine regulations. This review updates and expands on past work by assessing how precursor regulations affect illicit drug markets.

Method

We conducted a systematic review following PRISMA guidelines, searching 13 databases and relevant organizational websites for grey literature. Eligible studies quantitatively assessed precursor regulations' impact on drug supply, demand, or related harms. Due to intervention variability, we used narrative synthesis. Bias risk was evaluated with the EPOC Risk of Bias Tool.

Results

Twenty-six studies met the inclusion criteria, published between 2003 and 2023, focusing on methamphetamine (n = 23), cocaine (n = 3), and heroin (n = 1). Most were from the USA (n = 20), with others from Canada (n = 1), Mexico (n = 1), Australia (n = 3), and the Czech Republic (n = 1). The studies assessed 12 outcomes across 37 interventions, 14 of which were effective and 23 ineffective. Effective interventions led to impacts such as a 100 % price increase, a 40 % purity reduction, and a 43 % drop in past-month drug use, lasting from months to seven years. Ineffective interventions shared three issues: targeting unused chemicals, focusing on small-scale operations, or failing as suppliers adapted to new sources or routes.

Conclusions

Precursor regulations can reduce the supply, use, and harms of heroin, cocaine, and methamphetamine. However, they are not a one-size-fits-all solution. Their effectiveness depends on how they are designed and the context in which they are implemented.

Drug and Alcohol Dependence; 2025 Volume 276, 1 November 2025, 112900

Alcohol and drug detection rates in road traffic: An international comparison

By Hallvard Gjerde, Ragnhild Elén Gjulem Jamt

Driving under the influence of alcohol or drugs is a significant contributing factor to road traffic crashes. Detection rates for alcohol and drugs among drivers in random road traffic have been studied in several countries; this article presents a comprehensive overview of findings in studies conducted from 2010 to 2024. We searched PubMed, Google Scholar, Google Search, and the International Council on Alcohol, Drugs and Traffic Safety Conference Papers database. We also examined reference lists and citation records. We identified 53 studies, of which 25 studies focused exclusively on alcohol. The studies were conducted across 24 countries. Alcohol was the most frequently detected substance, followed by tetrahydrocannabinol (THC). Detection rates exhibited variability across jurisdictions; alcohol was most commonly observed in studies conducted in North America and in some low- and middle-income countries, whereas THC and cocaine were most frequently detected in studies from North America, Italy, and Spain. Several countries have implemented effective measures that have led to a significant reduction in the incidence of drink-driving. However, despite the introduction of legal thresholds or zero-tolerance policies for drug-impaired driving, the detection of drugs among drivers has increased in certain regions.

Forensic Science International: Reports. Dec. 2025

Unregulated Fentanyl in North America

By CECILIA FARFÁN-MÉNDEZ | JASON ELIGH 

More than 1.1 million people in the United States have died from opioid overdoses since 2000. In Canada, over 50,000 lives have been lost to opioid-related overdoses since 2016. Meanwhile, in Mexico, homicide—mostly committed with illegally trafficked firearms—is the leading cause of death among men aged 15 to 44. These overlapping crises reveal that the harms associated with synthetic opioids are not confined to one country but span all of North America.

This policy brief sheds light on how illicitly manufactured fentanyl (IMF) is produced and distributed within and across Mexico, the US, and Canada. The report reveals a complex and highly integrated system of production, tablet pressing, trafficking, and consumption. Far from being a product trafficked into North America, IMF is increasingly produced on its soil.nized Crime trilateral perspective

Building Barriers and Bridges. The Need for International Cooperation to Counter the Caribbean–Europe Drug Trade

By Christopher Hernandez-Roy and Rubi Bledsoe 

Drug trafficking, especially cocaine trafficking, from source countries in South America to Europe has produced alarming and lasting effects on both sides of the Atlantic. While various trafficking routes to Europe exist, transshipment through the Caribbean, including through the European territories in the region, is of growing concern. In Europe, the expanding cocaine market has brought a rise in homicides, kidnappings, and intimidation. In the city of Antwerp, for example, there were around 200 drug-related violent incidents in the past five years as competing gangs fought over control of territory. In the Caribbean, drug trafficking by organized crime has been associated with record homicide levels, corruption, democratic backsliding, and money laundering, among other pernicious effects. It has also prompted wars between gangs over the control of criminal economies, expanded illegal firearms trafficking, and exacerbated human trafficking both within the region and beyond. Shedding light on the complexity of the issue—while providing policy recommendations for increased cooperation between the United States, Europe, and Caribbean countries—is necessary as both continents seek regional and extra-regional security.

Washington, DC: CSIS, 2023. 11p.

The New Transatlantic Bonanza: Cocaine on Highway 10.

By Antonio L. Mazzitelli


The 10th Parallel marine and aerial routes linking South America and West Africa harbor a long history of trade between the two continents. More recently, these routes have become one of the preferred routes used by Latin American traffickers for shipping multi-tons of cocaine destined for the growing European market. The Parallel‘s growing importance in cocaine trafficking has made it known as cocaine ―Highway 10‖ among law enforcement. Latin American cocaine trafficking organizations, particularly the Colombian ones, have established stable bases in West Africa, controlling and developing the route. West African facilitators, Nigerians as well as an increasing number of nationals from all countries where shipments are stocked, have developed a stronger capacity for taking over a more ambitious and lucrative role in the business as transporters, partners, and final buyers. In one case (Guinea), the West African partner had already started developing his own trafficking and manufacturing capacity, reproducing the patterns that made Colombia the business model of the drug industry. In this reshaped context, of particular concern is the role played by the Colombian FARC (Fuerzas Armadas Revolucionarias de Colombia) as provider of cocaine shipments to West African cocaine entrepreneurs, as well as the impact of drug trafficking money on the financing of terrorist and rebel groups operating in the Sahel-Saharan belt. 

Miami:  Western Hemisphere Security Analysis Center. 2011. 22p.

Illicit Synthetic Drugs: Trafficking Methods, Money Laundering Practices, and Coordination Efforts

By Michael E. Clements, Triana McNeil et al


What GAO Found Mexican transnational criminal organizations are a major supplier of the top two illicit synthetic drugs involved in overdose deaths in the U.S.—fentanyl and methamphetamine. To supply these drugs to U.S. users, these organizations • source and purchase precursor chemicals primarily from China, using payment methods such as electronic funds transfers and virtual currency; • produce or oversee the production of fentanyl and methamphetamine in clandestine labs in Mexico; and • smuggle the drugs across the U.S.-Mexico border and supply them to U.S.- based drug trafficking groups. Local drug trafficking groups sell these drugs to users through e-commerce platforms, online marketplaces, mobile applications, and social media using payment methods such as cash, peer-to-peer payment applications, and virtual currency, according to Financial Crimes Enforcement Network (FinCEN) and Drug Enforcement Administration (DEA) reports. Transnational criminal organizations launder the illicit proceeds from synthetic drug sales using methods such as • bulk cash smuggling (moving physical currency across international borders), • funnel accounts (bank accounts that collect deposits from members of the criminal network in multiple locations), • trade-based money laundering (using goods in trade transactions to disguise the movement of illicit funds), • virtual currency (exchanging bulk cash for virtual currency), and • Chinese money laundering networks. Chinese money laundering networks are largely decentralized and use both underground-banking mechanisms (which bypass formal banking channels) and other laundering methods within banking systems to convert, move, and obscure illicit proceeds for a fee. Mexican transnational criminal organizations are increasingly using these networks in part because their laundering schemes have lower costs than other organizations, according to law enforcement officials. To combat drug trafficking and related money laundering, federal agencies coordinate and share information with each other and with state, local, and international partners through task forces, working and advisory groups, colocation, and other information-sharing channels. These mechanisms help agencies share resources and expertise, prevent overlapping investigations, and combine unique authorities. In addition, starting on January 20, 2025, the administration began instituting a variety of new policies, including some aimed at combating the flow of synthetic drugs into the U.S. For example, ExecutiveOrder 14159 requires the Departments of Justice and Homeland Security to jointly establish Homeland Security Task Forces in all 50 states to end the presence of cartels and transnational criminal organizations in the U.S. Agencies reported that it is too early to assess the full impact of these policies.

Washington, DC: United States Government Accountability Office; 67pp; 2025. 67p.

Bridging the Immigration Detention Justice Gap

By Jaclyn Kelley-Widmer and  Alisa Whitfield

Immigrants held in United States detention centers experience a de facto denial of their right to access to counsel. The 38,000 immigrants detained each day are largely held in remote facilities, where they experience extremely poor—often abusive—conditions; the inability to contact counsel or prepare their cases; and a legal framework that is stacked against them. Many scholars have studied the overlapping challenges detained immigrants face in a hostile regime and have proposed solutions ranging from ending immigration prison to providing universal representation for all those detained to revising legal rationales for detention. These ideas are good ones. However, as we work towards such goals, tens of thousands remain detained with little recourse. As a partial way to bridge that gap, we argue for a transformative, collaborative model of access to justice that focuses on community empowerment and combines the work of organizers, attorneys, and law students in clinics.

 This article uniquely blends both theory and practical perspectives to advance a theory of abolition-minded provision of legal services in detention. First, we explore the legal right of access to counsel for detained immigrants, with an overview of Constitutional and international human rights models. We then examine the severe barriers to this counsel that immigration detention creates. We then use theories of abolition and legal pedagogy to explore an innovative and critical model for expanding justice in immigration detention. We propose primary goals of increasing access to counsel, empowering communities, and supporting organizing to work towards the end of immigration detention.

 This article was inspired by our experiences representing detained immigrants in a clinical setting, with law students, and in coalition with agencies and organizers working on the ground. Through examples, stories, and even photographs, we weave in insights from this ongoing collaborative project to advance a framework for bridging the immigration detention justice gap.

Cornell Legal Studies Research Paper 25-18, 2024


From Border-Based to Status-Based Mandatory Detention

Boston College Law School Legal Studies Research Paper No. 65653 Fordham Urb. L. J. ___ (forthcoming 2026)44 Pages Posted: 16 Aug 2025 Last revised: 9 Sep 2025

By Mary Holper

The United States once authorized only border-based mandatory detention. However, immigration detention is now like an enormous fortress that has grown two mandatory detention turrets: status-based mandatory detention and crime-based mandatory detention. Status-based mandatory detention sees its only doctrinal foundations in the detention of those physically standing at the border. Yet, it has grown to reach both physically and temporally beyond those stopped at the border. Status-based mandatory detention first grew to include those stopped within 100 miles of a land border and under fourteen days in the U.S., whom immigration enforcement agents placed in expedited removal. Then, status-based mandatory detention grew further to include those stopped anywhere in the U.S. and under two years in the U.S., whom immigration enforcement agents placed in expedited removal. Most recently, status-based mandatory detention has grown to include persons who entered the U.S. at any time and whom immigration enforcement agents never placed in expedited removal. 
This article documents each of the blocks that have been placed in the massively-growing turret of status-based mandatory detention, and analyzes the strength of each block to hold up the turret. The article argues that broad status-based detention is inconsistent with the intent of Congress in passing what traditionally has been border-based mandatory detention. Under principles of statutory interpretation, this excessively large status-based mandatory detention turret cannot hold up.

Boston College Law School Legal Studies Research Paper No. 656, 53, 2025 Fordham Urb. L. J. ___ (forthcoming 2026)

Guns, Lawyers, and Markets: On Economic and Political Consequences of Costly Conflict

By Stergios Skaperdas and Samarth Vaidya

We synthesize research on conflict as a fundamental economic phenomenon, arguing that the implications of the ”dark side of self-interest” have received insufficient attention in economics. We define conflict as interactions where parties choose costly inputs that are adversarially combined against one another — distinct from the collaborative input combinations typical in economic models. We make four key contributions: First, we demonstrate that conflict induces economically significant costs comparable to or exceeding traditional deadweight losses. Second, we explain how these costs vary across contexts based on property rights protection, state capacity, and cultural norms. Third, we show how incorporating conflict into economic models leads to substantially different predictions than traditional models — including inverse relationships between compensation and productivity; distortions in comparative advantage; prices determined by power rather than solely by preferences endowments, and technology. Fourth, attributes of modern states such as centralization in the presence of law, checks and balances, other forms of distributed power, and the bureaucratic form of organization can partly be thought of as restraining conflict and appropriation, with implications for governance and economic development. Overall, in the presence of conflict and appropriation, power considerations cannot be separated from economics and first-best models are not empirically plausible.

 CESifo Working Paper No. 12135, 2025

Corporate Crime in European Emerging Markets

By Ichiro Iwasaki and Kocenda, Evzen

We examine the corporate criminal records of 18,187 firms operating in 17 European emerging markets and empirically analyze the effects of board composition and national institutions on crime deterrence. Our analysis reveals that 872 firms (about 5% of the sample) committed 1,734 crimes over 2020-2023. We show that firms with larger boards and greater board independence are associated with higher incidences of corporate crime, suggesting that larger or nominally independent boards may not function effectively in emerging market contexts. In contrast, female leadership and board gender diversity do not exhibit significant deterrent effects, implying that gender inclusion alone may not suffice in these environments. In banks with an outside board chairman, the occurrence of corporate crime increases substantially. Importantly, stronger national institutions consistently correlate with lower crime rates, a pattern observed universally across European emerging markets, and boards in countries with stronger institutions appear more effective in deterring crime

CESifo Working Paper No. 1213254 Pages Posted: 23 Sep 2025

Garbage in garbage out? Impacts of data quality on criminal network intervention

By Wang Ngai YeungRiccardo Di Clemente & Renaud Lambiotte

Criminal networks such as human trafficking rings are threats to the rule of law, democracy and public safety in our global society. Network science provides invaluable tools to identify key players and design interventions for Law Enforcement Agencies (LEAs), e.g., to dismantle their organisation. However, poor data quality and the robustness of criminal networks make effective intervention extremely challenging. Although there exists a large body of work building and applying network scientific tools to green intervene criminal networks, these work often neglect the problems of data incompleteness and inaccuracy. Moreover, there is thus far no comprehensive understanding of the impacts of data quality on the downstream effectiveness of interventions. This work investigates the relationship between data quality and intervention effectiveness based on classical graph theoretic and machine learning-based targeting approaches. Decentralization emerges as a major factor in network robustness, particularly under conditions of incomplete data, which renders intervention strategies largely ineffective. Moreover, the robustness of centralized networks can be boosted using simple heuristics, making targeted intervention more infeasible. Consequently, we advocate for a more cautious application of network science in disrupting criminal networks, the continuous development of an interoperable intelligence ecosystem, and the creation of novel network inference techniques to address data quality challenges.

 EPJ Data Sci. 14, 37 (2025)

THE BUSINESS OF EXPLOITATION:  THE ECONOMICS OF CYBER SCAM OPERATIONS IN SOUTHEAST ASIA

By Kristina Amerhauser | Audrey Thill 

  Cyber scam operations in Southeast Asia rely heavily on information and communications technology, financial fraud, trafficking for forced criminality, corruption and elite capture. This creates what can be described as ‘compound crimes’, reflecting how cyber scam operations are both based in physical compounds and involve multiple criminal markets. While estimates vary, the scale of funds defrauded from scam victims each year is in the tens of billions of US dollars and trending upward. In addition, illicit proceeds are generated from exploitation of trafficked persons, illegal gambling and corruption. The scale of illicit financial flows represents a clear threat to national economies, governance and international security. Cyber scam operations and their enabling networks operate at scale across Southeast Asia and beyond. They have reportedly trapped hundreds of thousands of people inside compounds where they are forced to conduct scams. Some operations retain workers through debt bondage, psychological coercion and financial incentives. Significant diversity in operational models – from high-security compounds to thousands of smaller operations located in apartments and other small premises – creates varied patterns of financial flows across jurisdictions. The money laundering process is part of a sophisticated financial service ecosystem. Most concerning is how networks of actors operate at scale and at the intersection of legitimate and illegitimate economies by using licensed crypto exchanges, registered fintech platforms and traditional banking services. Some are ‘crime as a service’ providers, explicitly providing money laundering services to cyber scam operations and doing so with corporate efficiency. This means that moving and laundering money has evolved into a marketplace-type structure where actors remain anonymous to others within the network. Governments, the private sector and civil society actors have sought innovative responses to disrupt the illicit industry. These include initiatives that ‘follow the money’ and disrupt the money laundering networks used by cyber scam operations. While some work has begun to explore illicit financial flows stemming from scam operations, notably related to cryptocurrencies, important gaps persist. Less is known about the wider set of financial flows, the mechanisms used to transfer proceeds in and out of the region and the networks involved. This policy brief seeks to help fill this gap by mapping wider related payments and providing insights into how money is moved and where it ultimately ends up. It concludes by providing actionable policy recommendations for Southeast Asian governments as well as regional and global financial service providers. Crucially, these recommendations identify entry points for disrupting the operations of the transnational organized crime groups that run cyber scam operations. The key findings include: Actors involved in cyber scams and trafficking for forced criminality often use cryptocurrency to move illicit money. They also use cash, fintech – such as peer-to-peer (P2P) payment apps – gaming or gambling platforms, bank transfers, shell and front companies, credit cards and pre-paid cards. The role of the formal banking sector in these financial flows appears significant, as many scam-related transfers are initiated by the victim from their own bank accounts before being converted into cryptocurrencies at different steps of the laundering process. While most financial institutions likely process these transactions unwittingly, evidence suggests they may be enabled by regulatory loopholes such as weak know-your-customer (KYC) requirements and/or excessively high minimum thresholds for reporting suspicious transactions. After being laundered and converted back into fiat currency4 from cryptocurrency, illicit funds are also likely to be moved again through the formal financial system.

Many of the fintech and cryptocurrency platforms that money laundering networks use to convert cryptocurrencies back into fiat are registered companies and hold financial service licences. Some owners of these platforms have close connections to the political and business elites in the countries of registration, suggesting influence over financial regulation and an interest in maintaining a policy environment amenable to the large-scale laundering of criminal proceeds. Transnational organized crime groups in Southeast Asia generate highly lucrative profits. This creates a vicious cycle: greater profits enable these groups to expand their influence, including over public officials and the financial sector, which in turn reduces scrutiny of cyber scam compounds and related suspicious financial transactions. With their growing wealth, these criminal networks invest further into other types of crime and crime-as-a-service infrastructure, generating additional profits that allow them to strengthen their influence and market position   
Geneva: Global Initiative Against Transnational Organized Crime. 2025. 44p.

Cybersecurity: Network Monitoring Program Needs Further Guidance and Actions

By Jennifer Franks

The Department of Homeland Security's Continuous Diagnostics and Mitigation (CDM) program gives agencies cybersecurity tools to strengthen the networks and systems they use to meet their missions.While the program has met two of its goals, it lacks sufficient guidance for managing network security and data protection. The program generally supports government-wide cybersecurity initiatives, but DHS's Cybersecurity and Infrastructure Security Agency hasn't finalized all plans for how CDM can provide support. For example, the agency hasn't fully updated the program's cloud asset management guidance.

We recommended DHS address these issues

Washington, DC: U.S. Government Accountability Office, 2025. 46p.

Artificial Intelligence, Cybersecurity, and National Security:

By Richard Danzig

In this paper, the author warns national security decisionmakers that to accomplish their missions they urgently need to better prepare for the impact of artificial intelligence (AI) on cybersecurity. He analyzes the present failings of the U.S. government in this respect, highlights the consequences of these failings, and makes recommendations for correcting them. He offers this effort as a case study and draws from it ten propositions relevant to those who are more broadly concerned with how AI, other technologies, and human decisions are intertwined and co-evolving.

Santa Monica, CA: RAND, 2025.

Cybercrime and strain theory: An examination of online crime and gender.

By Katalin Parti, Thomas Dearden

Purpose: Historically, cybercrime has been seen as a near exclusively male activity. We were interested to learn whether the relationship between strain and crime holds for both males and females.

Methods: We utilized an online survey instrument to collect data from a national sample of individuals (n=2,121) representing the US population by age, gender, race and ethnicity. We asked offending related questions regarding various cybercrimes. In the current study, we use data from 390 individuals who reported a cybercrime activity within the past 12 months.

Results: We find strong support for prior strains correlating with both specific (e.g., illegal uploading) and general cyber-offending. We further examine whether gender interacts with strain. While general strain theory (GST) correlates with cyber-offending for both males and females, we did find a few important differences. Except for lack of trust in others and receiving unsatisfactory evaluation at school or work, there are different variables responsible for online offending for men and women. Parents’ divorcing, anonymity, and online video gaming increase cybercrime offending in women, whereas falling victim to a crime, breaking up with a significant other, and darkweb activity are correlated with cyber-offending for men.

Conclusion: Although GST functions differently by gender when it comes to engaging in cyber-offending, the theory is indeed gender-specific, as different strain variables are responsible for engaging in cyber-offending in women and men. Components of general strain responsible for cyber-offending need to be further studied concerning gender. According to our results, GST is gender-specific, and these variables need to be further studied.

International Journal of Criminology and Sociology13, 211–226