Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Crime
Firearm-related violence in the Caribbean is a complex systemic issue: how do we move towards a solution?

By Natasha P. Sobers, Joeleita Agard, Katrina Norville, Anne-Séverine Fabre, Nicolas Florquin, Callixtus Joseph, Madeleine Joseph, Maria Garcia-Joseph, Reginald King, Patrick Jason Toppin, Hugh Wong, Simon G. Anderson

In the Caribbean, gun violence has reached crisis levels and regional heads of government have called for a public health approach to inform prevention and control. Feedback loops resulting from work carried out under the ‘Pathway to Policy’ project showed that firearm-related crimes increased the chances of household poverty, national economic costs, deaths and disability and promoted a culture of violence, all of which reinforced gun violence. Interventions to reduce illicit access and use of firearms, social development programs, and investment in educational systems may balance rates of gun violence.

Firearm-related violence in the Caribbean is a complex systemic issue: how do we move towards a solution?—an article co-written with our project partners from the Caribbean Community Implementation Agency for Crime and Security, the Caribbean Public Health Agency, and the George Alleyne Chronic Disease Center at the University of the West Indies—discusses the work carried out by the Advisory Committee of Regional Experts, a multisectoral group convened to develop a ‘pathway to policy’ that informs a regional approach to tackling firearm violence. Using a systems mapping technique to inform our understanding of firearm-related crimes and injuries based on the expertise of stakeholders and based on analysis of publicly available data from thirteen countries within the Caribbean Community, this article calls for greater attention to the equilibrium between crime response strategies and prevention approaches.

Identity-Based Mass Violence in Urban Contexts: Uncovered

By Rachel Locke, Kelsey Paul Shantz, Andrei Serbin Pont, Jai-Ayla Sutherland
This open access book represents a multiyear exploration into identity-based mass violence (IBMV) within urban contexts. It explores the complexities of structural and acute violence in cities, drawing on local solutions rooted in the fields of urban violence prevention, atrocity prevention, and peacebuilding. The authors present a multidimensional approach that addresses sexual and gender-based violence, racial and ethnic violence, gang or group-based violence, state-perpetrated violence, political violence, violence against migrants, and others. The volume investigates the outsized influence of power in shaping how violence is understood and how prevention outcomes are evaluated. The chapters span scholarship, practical guidance, and lived experience of enduring and bearing witness to IBMV. This volume speaks directly to reform-minded partners and allies in policy and practice, as well as to funders and supporters. It provides a practical foundation for collaborative, prevention-focused action and policy opportunities.
Cham: Springer Nature, 2025. 

Unregulated Fentanyl in North America

By CECILIA FARFÁN-MÉNDEZ | JASON ELIGH 

More than 1.1 million people in the United States have died from opioid overdoses since 2000. In Canada, over 50,000 lives have been lost to opioid-related overdoses since 2016. Meanwhile, in Mexico, homicide—mostly committed with illegally trafficked firearms—is the leading cause of death among men aged 15 to 44. These overlapping crises reveal that the harms associated with synthetic opioids are not confined to one country but span all of North America.

This policy brief sheds light on how illicitly manufactured fentanyl (IMF) is produced and distributed within and across Mexico, the US, and Canada. The report reveals a complex and highly integrated system of production, tablet pressing, trafficking, and consumption. Far from being a product trafficked into North America, IMF is increasingly produced on its soil.nized Crime trilateral perspective

Illicit Synthetic Drugs: Trafficking Methods, Money Laundering Practices, and Coordination Efforts

By Michael E. Clements, Triana McNeil et al


What GAO Found Mexican transnational criminal organizations are a major supplier of the top two illicit synthetic drugs involved in overdose deaths in the U.S.—fentanyl and methamphetamine. To supply these drugs to U.S. users, these organizations • source and purchase precursor chemicals primarily from China, using payment methods such as electronic funds transfers and virtual currency; • produce or oversee the production of fentanyl and methamphetamine in clandestine labs in Mexico; and • smuggle the drugs across the U.S.-Mexico border and supply them to U.S.- based drug trafficking groups. Local drug trafficking groups sell these drugs to users through e-commerce platforms, online marketplaces, mobile applications, and social media using payment methods such as cash, peer-to-peer payment applications, and virtual currency, according to Financial Crimes Enforcement Network (FinCEN) and Drug Enforcement Administration (DEA) reports. Transnational criminal organizations launder the illicit proceeds from synthetic drug sales using methods such as • bulk cash smuggling (moving physical currency across international borders), • funnel accounts (bank accounts that collect deposits from members of the criminal network in multiple locations), • trade-based money laundering (using goods in trade transactions to disguise the movement of illicit funds), • virtual currency (exchanging bulk cash for virtual currency), and • Chinese money laundering networks. Chinese money laundering networks are largely decentralized and use both underground-banking mechanisms (which bypass formal banking channels) and other laundering methods within banking systems to convert, move, and obscure illicit proceeds for a fee. Mexican transnational criminal organizations are increasingly using these networks in part because their laundering schemes have lower costs than other organizations, according to law enforcement officials. To combat drug trafficking and related money laundering, federal agencies coordinate and share information with each other and with state, local, and international partners through task forces, working and advisory groups, colocation, and other information-sharing channels. These mechanisms help agencies share resources and expertise, prevent overlapping investigations, and combine unique authorities. In addition, starting on January 20, 2025, the administration began instituting a variety of new policies, including some aimed at combating the flow of synthetic drugs into the U.S. For example, ExecutiveOrder 14159 requires the Departments of Justice and Homeland Security to jointly establish Homeland Security Task Forces in all 50 states to end the presence of cartels and transnational criminal organizations in the U.S. Agencies reported that it is too early to assess the full impact of these policies.

Washington, DC: United States Government Accountability Office; 67pp; 2025. 67p.

Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace,

By Winnona DeSombre Bernsen

If the United States wants to increasingly use offensive cyber operations internationally, does it have the supply chain and acquisition capabilities to back it up—especially if its adversary is the People’s Republic of China? 

 The Cyber Statecraft Initiative’s new report from CSI nonresident fellow Winnona DeSombre Bernsen, Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace,  is the first to conduct a comparative study within the international offensive cyber supply chain, comparing the United States’ fragmented, risk-averse acquisition model with China’s outsourced and funnel-like approach.

 Strategic competition between the United States and China has long played out in cyberspace, where offensive cyber capabilities, like zero-day vulnerabilities, are a strategic resource. Since 2016, China has been turning the zero-day marketplace in East Asia into a funnel of offensive cyber capabilities for its military and intelligence services, both to ensure it can break into the most secure Western technologies and to deny the United States from obtaining similar capabilities from the region. If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.

Washington, DC: Atlantic Council, 2025. 44p

Extended editorial: preventing fraud and cybercrime in an ageing society

By Mark Button  · Vasileios Karagiannopoulos  · Julak Lee  · Joon Bae Suh  · Jeyong Jung

Introduction The nature of crime has been changing globally with technological and other societal developments fuelling a growth in fraud and cybercrime (Button and Cross 2017). The diversity and rapid evolution of a broad range of scams has led to millions across the globe becoming victims of fraud (Federal Trade Commission 2019; ONS 2023a, 2023b). A common belief often promoted in policy circles and some research is that older adults are more vulnerable to fraud (James et al. 2014). This is not so clear cut, however, as in terms of victimisation, the middle aged have been most at risk (see Fig. 1 later). This is changing and there is evidence older adults (65+) are fast becoming the one of the most at risk categories and that they also tend to lose much more than other age groups (see Table 1 later). Indeed, there are a variety of trends fuelling a potential explosion in fraud and cybercrime among older adults unless serious action is taken to reduce the risks that we will shortly explore. It is for this reason we conceived this special edition and the research project that underpins it. To set the context for this edition, it is important to examine the factors fuelling the growth in fraud and cybercrime victimisation among older age groups. We will do this using data from the UK and South Korea. The reason for the selection of these countries is simple. The funding for the project stimulating this edition came from ESRC funding aimed at developing relationships with these two countries 

  Security Journal (2025) 38:40

Crime and Fear Of Crime In Rural Areas

By Lisa Westfelt, Sara Jonsson and Ulrika Lindstedt

Brå has been commissioned by the Government to survey crime and fear of crime in rural areas. Brå’s commission has included describing the specific nature of criminality and how fear of crime affects people in rural areas. Brå has also analysed the incidence of crimes committed by animal rights activists. The study is mainly based on police report statistics, the Swedish Crime Survey and interviews both with municipal police officers and crime prevention coordinators in rural municipalities and with experts. Less crime and greater sense of safety As with previous studies in this area, the analysis shows that, overall, there is less crime in rural areas. This applies to both reported offences and self-reported victimisation. People living in rural municipalities report less fear of crime than those in other types of municipalities. Crime trends follow broadly the same patterns as elsewhere in Sweden. According to the Swedish Crime Survey, various types of municipalities show no differences in terms of citizens’ experiences with the police, but the survey shows a marginally lower level of confidence in the justice system in rural municipalities. However, several interviewees argue that confidence in the police, as well as in public authorities in general, is lower in certain very sparsely populated rural areas. Specific challenges for crime prevention There are certain conditions in rural areas that, directly or indirectly, impact crime and create challenges for crime prevention. Financial difficulties and skills shortages Many rural municipalities have declining and ageing populations, which leads to a shrinking tax base and financial difficulties. The low population density and declining populations of rural areas have made it more difficult for businesses providing goods and services in rural areas to operate. As public utilities and infrastructure are gradually dismantled, social trust can be negatively affected, and, with it, confidence in the justice system. Our interviews reveal that municipalities experience difficulty in securing necessary skills as well as in recruiting and retaining municipal police.

English summary of Brå report 2025:1 Stockholm: The Swedish National Council for Crime Prevention (Brå), 2025.2025. 8p.

Superhighway Robbery

By Graeme R. Newman and Ronald V. Clarke

In Superhighway Robbery, Graeme Newman and Ronald Clarke provide a grounded, pragmatic analysis of how the digital revolution didn't necessarily create new types of criminals, but rather provided them with a much more efficient set of tools. They move away from the sensationalized "hacker" myths of the early 2000s to focus on the cold reality of Situational Crime Prevention. The book's central thesis is that the internet acts as a vast infrastructure—a superhighway—that significantly reduces the effort required to commit traditional crimes like theft, fraud, and piracy while increasing the potential rewards and lowering the risk of being caught.

By applying their famous CRAVED model to the digital world, the authors explain that data and software are the ultimate targets because they are easily concealable, removable, and available. They argue that the most effective way to stop cybercrime is not to wait for a change in human nature, but to change the digital environment itself. This involves "designing out" crime by making digital targets harder to reach and less profitable to exploit. Ultimately, Newman and Clarke strip away the mystery of the "Information Age" to reveal that cybercrime is essentially a matter of opportunity, and by closing those digital windows of opportunity, we can make the superhighway a significantly safer place.

In the digital realm, the CRAVED model explains why certain data or media becomes a prime target for "superhighway robbery." Concealability is at an all-time high because digital files take up no physical space and can be hidden in encrypted folders or behind innocuous filenames, making them easy to possess without detection. These files are incredibly Removable because they can be copied or moved across the globe in milliseconds, allowing a thief to "steal" an item while the original remains in place. The Availability of these targets is virtually limitless; once a movie or piece of software is uploaded to a server, it is accessible to anyone with a connection, twenty-four hours a day.

The Value of digital goods remains high because they often represent thousands of hours of professional labor or sensitive personal information that can be sold on the dark web. These items are also highly Enjoyable, as they often consist of popular entertainment, games, or high-end tools that people naturally want to use. Finally, they are perfectly Disposablebecause there is a massive, ready-made market of willing buyers or downloaders, ensuring that a criminal can quickly offload their "loot" for profit or social capital without the logistical headaches of physical fencing.

Cullompton, Devon. UK. Willan. 2003.

Numismatic Forgery

By Charles M. Larson

In "Numismatic Forgery," author Charles M. Larson pulls back the curtain on one of the most secretive and sophisticated threats to the world of coin collecting.1 Far from a simple historical overview, this book serves as a definitive guide to the dark art of the "super-forger," detailing the methods used to deceive even the most seasoned experts.

Larson provides a deep dive into the technical evolution of counterfeiting—from the crude cast copies of the past to the modern, high-precision struck forgeries that haunt the current marketplace. By meticulously explaining the tools of the trade, including centrifugal casting, pressure casting, and the creation of deceptive dies, Larson equips collectors, dealers, and historians with the knowledge necessary to spot the subtle "tells" of a fake.

Key features of this essential numismatic reference include:

  • The Forger's Toolkit: A step-by-step examination of the physical processes used to create counterfeit currency.

  • Detection Techniques: Practical advice on identifying "transfer marks," edge filing, and suspicious luster.

  • Case Studies: Real-world examples of famous forgeries that have infiltrated major collections.

  • The Ethics of the Hobby: A sobering look at how forgery undermines the historical integrity of numismatics.

Whether you are a casual hobbyist or a professional dealer protecting a million-dollar inventory, "Numismatic Forgery"is an indispensable resource for anyone who wants to ensure that the history they hold in their hands is the real deal.

Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

Classical Deception: Counterfeits, Forgeries and Reproductions of Ancient Coins

Wayne G. Sayles:


Classical Deception is a detailed and accessible exploration of the long history of counterfeit ancient coins and the methods by which they are produced, detected, and sometimes unwittingly circulated within the numismatic world. Designed for collectors, students of antiquity, and museum professionals alike, the book traces forgery practices from antiquity to the modern era, showing that imitations have accompanied genuine coinage for as long as coins have existed. Sayles examines a spectrum of deceptions — from ancient contemporary counterfeits meant to pass in daily commerce, to the sophisticated modern forgeries that challenge even seasoned experts.

A substantial portion of the book profiles well-known forgers, documenting their techniques, motives, and the specific pieces they produced. Sayles pays particular attention to the prolific work of modern reproduction artists, including Peter Rosa, whose replicas are widely encountered and often misunderstood by beginning collectors. More than 200 photographs allow readers to visually compare authentic coins with their deceptive counterparts, highlighting telltale markers in style, fabric, metallurgy, and die workmanship.

Sayles also introduces the scientific and observational tools available to detect fakes — from simple weight measurement and magnified study of surfaces to metallurgical testing, microscopy, and imaging technologies. Throughout, he emphasizes practical guidance: what warning signs to look for, how to assess provenance, and how to avoid costly errors in the marketplace.

Ultimately, Classical Deception serves both as a cautionary manual and as a historical study of ingenuity, fraud, and craftsmanship. It equips the reader to navigate the hazards of collecting while deepening appreciation for the authentic artistry of ancient coinage.

Perspectives on Identity Theft

By Megan M. McNally and Graeme R. Newman

From the cover: There has been a glaring lack of scholarly attention to the crime of identity theft, according to the editors. The chapters in this volume attempt to fill some of this gap by exploring theory and research on identity theft, as well as situational measures to prevent its occurrence.

The editors' introduction outlines several key issues related to the definition, extent and commission of identity theft. The chapter by Graeme Newman applies the opportunity perspective to the study of identity theft. Megan

McNally uses the "script" approach to examine the meaning and mechanics of identity theft in all of its forms. Henry Pontell, Gregory Brown and Anastasia Tosouni present new findings on how identity theft affects victims, based on data collected by the Identity Theft Resource Center. Heith Copes and Lynne Vieraitis describe how a sample of identity theft offenders viewed their crimes. Michael Levi recounts the evolution of identity fraud and its control in the U.K. Russell Smith presents a framework for evaluating preventive measures, particularly document-based systems, biometric technologies and identity cards. Sara Berg considers how information technology can be used within a situational crime prevention framework to fight identity theft. Robert Willison examines the use of situational crime prevention to protect sensitive personal information in the context of information systems security.

Crime Prevention Studies, volume 23. Willan Publishing. Culmcott House, Uffculme, Cullompton Devon EX 15 3AT, U.K. 2008. 195p.

Divided, They Rule? The Emerging Banditry Landscape in Northwest Nigeria 

By Schouten, Peer; Barnett, James

Banditry in northwest Nigeria has emerged as a pervasive security challenge, yet remains overshadowed by the focus on jihadist violence in the region. This report examines the evolution of banditry as a decentralised and dynamic phenomenon, encompassing cattle rustling, kidnapping for ransom, extortion and illicit mining. Unlike jihadist groups, bandit networks operate without ideological ambitions but significantly influence rural governance, challenging state authority through both roving predation and stationary extortion. The study explores the structure of bandit society, revealing a fragmented yet resilient hierarchy where power is defined by access to weapons, wealth and followers. Based on extensive field research and historical analysis, the report highlights how contemporary banditry borrows from precolonial patterns of violent regulation. It maps the emerging political geography of banditry, which, like precolonial rule, involves a system of concentric circles: bandit heartlands marked by cohabitation and governance, tribute zones where communities pay levies for security, and volatile raiding frontiers. This spatial model offers new insight into the variable of banditry and its differential effects on rural communities

DIIS Report Vol. 2025 No. 07 Copenhagen: DIIS: Danish Institute for International Studies, 2025. 77p.

The Influence of Firearm Dealer Openings and Closings on Local Shootings in the U.S.

By Daniel C. Semenza PhD 1 2 3, Ian A. Silver PhD 4, Richard Stansfield PhD 1, Brielle Savage MA 5

Firearm dealer presence and density are associated with rates of local firearm violence, a significant threat to public safety and collective well-being in the U.S. However, the authors are unaware of any studies that have examined how dealer presence and absence influence shooting rates over time using longitudinal data.

Methods

This study investigates the relationship between licensed firearm dealer presence and firearm violence using longitudinal data from over 20,000 census tracts in the 100 largest cities in the U.S. from 2015 to 2022. The analysis was conducted in 2025. The association between licensed firearm dealer openings and closings and total shooting rates was analyzed across 1-, 2-, and 3-year lag periods to account for differences in how dealer presence influences local firearm violence dynamics over time.

Results

Findings demonstrate that neighborhoods with newly opened firearm dealers experience increases in shootings that sustain after 2 and 3 years. No significant effects were found for firearm dealer closings.

Conclusions

The results highlight a complex temporal dynamic, suggesting that firearm availability through licensed firearm dealers may influence patterns of shootings within communities, particularly when new dealers open in neighborhoods without a prior dealer presence over time.

American Journal of Preventive Medicine 10 October 2025, 108079 In Press, Corrected Proof

Australian Drug Trends 2025: Key Findings from the National Illicit Drug Reporting System (IDRS) Interviews

By Sutherland R, Uporova J, Karlsson A, Palmer L, Tayeb H, Chrzanowska A, Chandrasena U, Price O, Bruno R, Dietze P, Lenton S, Salom C, Radke S, Curran J, Vella-Horne D, Wilson J, Daly C, Thomas N, Degenhardt L, Farrell M, & Peacock A

The IDRS comprises a sentinel sample of people who regularly inject illicit drugs, recruited via advertisements in needle syringe programs and other harm reduction services, as well as via peer referral, across each capital city of Australia. The results are not representative of all people who inject drugs, nor of use in the general population. Data were collected in 2025 from May-July. Since 2020, interviews were delivered face-toface as well as via telephone, to reduce risk of COVID-19 transmission; all interviews prior to 2020 were conducted face-to-face. This methodological change should be factored into all comparisons of data from the 2020-2025 samples relative to previous years.

Australian Drug Trends 2025: Key Findings from the National Illicit Drug Reporting System (IDRS) Interviews. Sydney: National Drug and Alcohol Research Centre, UNSW Sydney; 2025

Private Military Companies and Arms Control Challenges: The Wagner Group in Mali

The UN and the African Union (AU) have repeatedly warned about the growing use of mercenaries and private military companies (PMCs) in conflict situations. Concerns include the involvement of mercenary groups in transnational organized crime and human rights violations, and the ‘re-routing’ of weapons intended for a state’s military to mercenary groups and PMCs. This re-routing of weapons undermines international and domestic arms control regimes, which are intended to ensure that arms are not used to undermine peace and security, or breach human rights. Since 2021, Mali’s security and political landscape has transformed. After coming to power, the military junta invited the Wagner Group into the country, cut ties with Mali’s former security partners, requested the departure of international forces (from France and the UN peacekeeping mission) and (in 2024) left the Economic Community of West African States (ECOWAS). In this new landscape, the Wagner Group emerged as the junta’s new ally and was soon actively involved in combat operations against insurgents. The Wagner Group’s tenure in Mali, as widely documented by UN bodies, non-governmental organizations (NGOs) and the media, was characterized by serious human rights abuses and war crimes, including massacres, torture and rapes of civilians, and criminal activity, from looting communities to illicit taxation of gold mining sites. For observers of the conflict, such atrocities were not unexpected, as Wagner troops were operating alongside the Malian Armed Forces (Forces Armées Maliennes, FAMa), which have been accused of human rights violations and mismanagement of weapons. However, with the deployment of Wagner troops, violence against civilians increased drastically, beyond the norms set previously by FAMa – civilian casualties per incident doubled between 2021 and 2024. The Wagner Group did not arrive in Mali fully equipped, and troops were expected to source weapons locally, which they did through seizing arms during combat and stealing official stock. This was one of the reasons for communications between Wagner and FAMa troops breaking down. From 2023, joint Wagner/FAMa missions declined, meaning that the Wagner troops operated independently using FAMa-owned equipment. Drawing from an extensive review of open-source material related to Wagner Group operations in Mali and interviews with military sources in Mali and other experts, this paper identifies instances of weapons and equipment intended for use by FAMa being re-routed to Wagner, enabling war crimes and human rights violations. They include FAMa armoured vehicles, vehicle-mounted heavy machine guns (widely known as ‘technicals’) and possibly attack drones – all of which are covered under the Arms Trade Treaty (ATT). Some instances of re-routing weapons from FAMa to the Wagner Group appear to be in breach of commitments under the ATT, which has been signed by Mali, as well as some of the domestic arms control commitments of several weapons-supplying countries. The Wagner Group’s operations in Mali came to an end in June 2025, and the group has been replaced with the Africa Corps, which is more closely controlled by the Russian state but continues to employ a majority of former-Wagner personnel. Therefore, the Wagner Group may have left Mali in name but has not left in practice. Furthermore, Wagner’s operations in Mali are just one example of re-routing state-to-state transfers of weapons to private military actors, which undermines the international legal frameworks that regulate the arms trade. The international community will need to deal with the phenomenon of the growing use of mercenaries and PMCs in global conflicts and their impact on arms control regimes. The paper makes recommendations for improving governance of the sector, which are summarized below: ■ Arms-exporting countries should undertake additional due diligence when considering an export to any country that has engaged with, hired or collaborated with a PMC. ■ Arms manufacturers should also undertake additional due diligence when looking to supply countries that have engaged with PMCs. ■ International forums on arms control and counter-proliferation should address the emerging role of PMCs in global conflicts, and the impact on arms control mechanisms and on reshaping illicit arms markets. ■ The AU should revise the 1977 Convention for the Elimination of Mercenaries in Africa to include better provisions for monitoring human rights abuses by mercenaries, including those that are backed by a third-party state. ■ International peacekeeping forces should continue to ensure that any equipment left following drawdown is withdrawn or destroyed in line with UN guidelines. After providing a background on the Wagner Group’s tenure in Mali, this paper documents evidence of weapons and equipment intended for use by FAMa being re-routed to Wagner Group operations, enabling war crimes and human rights violations. It then examines the legal implications for exporting countries, arms suppliers and Mali of arms transferred to FAMa being re-routed to Wagner. In so doing, the paper provides a case study that highlights the need for global arms control regimes to grapple with the growing reality of rogue PMCs being embedded within national militaries and the hybridization of PMCs in conflict and organized criminal activity. As the UN Working Group (UNWG) 2024 report indicates, this is a broader issue than just the Wagner Group and their recent tenure in Mali.

Geneva: Global Initiative Against Transnational Organized Crime. 2025. 36p.

Abnormal Man : Volume 2 - Bibliography

By Arthur MacDonald.

The narrative in Volume 1 asks many pointed questions: What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

The Read-Me.org edition Volume 1 presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy. To make such work, much of it controversial then as it is today, minimally believable, requires extensive documentation. The voluminous Bibliography of Abnormal Man reproduced here in Volume 2, contains all that Macdnald referred to within his detailed exposition. To some, his arguments may seem unsupported, or lacking in evidence. But he left no stone untuned as this amazing bibliographical documentation of all relative contemporary research

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 240p.

Abnormal Man : Volume 1 --Digest of Literature

By Arthur MacDonald. Introduction by Graeme R. Newman

What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

This new Read-Me.org edition presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy.

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. p.193.

Criminal Justice: A Multidisciplinary Bibliography

By Florence Yosne. National Criminal Justice Educational Development Project Portland State University And Center Of Criminal Justice Arizona State University.

From the Introduction: This bibliography is the result of a cooperative effort between Portland State University and Arizona State University. It was developed in response to a need for a comprehensive and detailed multi-disciplinary compilation of available books and government documents that relate to the emerging field of Criminal Justice. Professional journals and magazine sources were not included due to person power constraints and the recognition that many of the more significant articles and statements relating to Criminal Justice can be found contained in recently-published books.

The bibliography is broken down into four general substantive areas: (1) criminal justice; (2) law enforcement; (3) corrections;  and (4) courts. The majority of the works are included under the heading "Criminal Justice." In this area, titles are included from such diverse fields as anthropology, economics, education, history, law, political science, psychology, the physical sciences, public administration, and sociology. The other three areas--"Law, Enforcement, " "Corrections, " and "Courts"--while more specific in nature, also reflect the use of information and research from many related and diverse sources.

Clearly, the specific subjects appearing within these four broad rubrics are varied and numerous. In order to facilitate the use of this bibliography, the four broad areas were further broken down into specific subjects such as "civil liberties, " "victimless crimes, " etc., with bibliography entries relating to those topics being identified. The detailed classification of bibliography entries appears at the end of this "Introduction."

It will be readily apparent to the user that the bibliography is multi-disciplinary in nature. This reflects the editor's view that Criminal Justice is a multi-disciplinary, problem-oriented field of scholarship, research, and teaching, embracing those aspects of the social, behavioral, natural, and medical sciences relating to understanding crime and social deviance and entailing a critical examination of the system which has evolved for the handling of attendant problems. The selection of authors, titles, and subjects reflects the need of Criminal Justice, as an emerging field of study, to be sensitive to the ideas and philosophies of a wide range of scholar sand researchers. A bibliography with a narrow focus is of organization and functioning of an entire society.

The sources for the bibliography were legion, and they also reflect the multi-disciplinary approach. Bibliographies from the faculty at Portland State University, Florida Slate University, Michigan State University, San Jose State University, and the University of California at Berkeley, in addition to the Index of Books in Print, catalogs from the National Criminal Justice Reference Service, lists from publishers, and reviews from the New York Review of Books, Psychology Today, and the Atlantic Monthly, provided the editor with the reference material necessary for so vast an undertaking.

 MEMBERS NATIONAL CRIMINAL JUSTICE EDUCATIONAL CONSORTIUM. 1975. 418p.

Russia’s Crime-Terror Nexus: Criminality as a Tool of Hybrid Warfare in Europe

By Kacper Rekawek, Julian Lanchès, and Maria Zotova 

In this Report, Kacper Rekawek, Julian Lanchès, and Maria Zotova document how Russia has institutionalised a “crime-terror nexus” in its hybrid warfare strategy by recruiting criminal actors with weak societal ties across Europe to carry out kinetic and non-kinetic operations in support of state policy. They argue that since its full-scale invasion of Ukraine in 2022, this nexus has become central to Moscow’s ability to project power and evade accountability, and they offer policy recommendations to help European states and EU institutions detect, disrupt, and contain these criminally driven hybrid threats.

This report takes stock of Russian hybrid warfare in Europe in the context of its war of aggression against Ukraine. While doing so, it offers more than a catalogue of kinetic incidents attributed to Moscow; it focuses on the perpetrators and situates their actions within Russia’s longstanding reliance on hybrid warfare. This analysis highlights that many of these actors have criminal backgrounds and demonstrates how Russia has built its own state-driven “crime-terror nexus.” The phenomenon recalls earlier patterns seen in terrorist organisations such as ISIS, which recruited Europe’s criminals into violent campaigns under the guise of ideological redemption. This time, however, the state itself actively recruits and grooms socially marginalised, often Russian-speaking individuals residing in Europe to assist in state terrorism against European societies. This strategy complements the “spook-gangster” nexus that has for years underpinned Russia’s governance and operationalisation of foreign policy. Since the 2022 full-scale invasion of Ukraine, this nexus has become even more instrumental in mitigating the economic and geopolitical consequences of Moscow’s aggression. The report shows the extent to which criminality – whether through direct reliance on criminals to conduct attacks or through the “spook-gangster” nexus – constitutes a central pillar of Russia’s hybrid warfare. It opens with an overview of the phenomenon and traces Russia’s experience with hybrid tactics back to at least the 1920s. It then explores Moscow’s enduring use of criminality as a tool of domestic control and foreign policy, with particular emphasis on the post-2022 period. A brief comparative perspective highlights how other hostile state actors similarly integrate criminality into hybrid campaigns waged globally. All of these components build toward the report’s central focus: an assessment of Russia’s kinetic campaign as an integral part of its broader hybrid warfare, and of the actors enabling it. The final section provides practical recommendations to inform policies for both national authorities and EU institutions.

GLOBSEC and the International Centre for Counter-Terrorism (ICCT)2025. 23p.