Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Prevention
Guns, Lawyers, and Markets: On Economic and Political Consequences of Costly Conflict

By Stergios Skaperdas and Samarth Vaidya

We synthesize research on conflict as a fundamental economic phenomenon, arguing that the implications of the ”dark side of self-interest” have received insufficient attention in economics. We define conflict as interactions where parties choose costly inputs that are adversarially combined against one another — distinct from the collaborative input combinations typical in economic models. We make four key contributions: First, we demonstrate that conflict induces economically significant costs comparable to or exceeding traditional deadweight losses. Second, we explain how these costs vary across contexts based on property rights protection, state capacity, and cultural norms. Third, we show how incorporating conflict into economic models leads to substantially different predictions than traditional models — including inverse relationships between compensation and productivity; distortions in comparative advantage; prices determined by power rather than solely by preferences endowments, and technology. Fourth, attributes of modern states such as centralization in the presence of law, checks and balances, other forms of distributed power, and the bureaucratic form of organization can partly be thought of as restraining conflict and appropriation, with implications for governance and economic development. Overall, in the presence of conflict and appropriation, power considerations cannot be separated from economics and first-best models are not empirically plausible.

 CESifo Working Paper No. 12135, 2025

Artificial Intelligence, Cybersecurity, and National Security:

By Richard Danzig

In this paper, the author warns national security decisionmakers that to accomplish their missions they urgently need to better prepare for the impact of artificial intelligence (AI) on cybersecurity. He analyzes the present failings of the U.S. government in this respect, highlights the consequences of these failings, and makes recommendations for correcting them. He offers this effort as a case study and draws from it ten propositions relevant to those who are more broadly concerned with how AI, other technologies, and human decisions are intertwined and co-evolving.

Santa Monica, CA: RAND, 2025.

The wisdom of the scammed: redefning older fraud victim support by utilizing the ecological systems framework

By Katalin Parti  · Faika Tahir  · Pamela B. Teaster 

Cyber victimization targeting vulnerable populations, particularly older adults, has become increasingly prevalent in the digital age. Grounded in the Bioecological Systems Framework (Bronfenbrenner in The ecology of human development: Experiments by nature and design, Harvard University Press, Cambridge, 1979), this research explores the factors contributing to victimization, including the ease of exploitation, the situational factors setting up victims for scams, their vulnerabilities, the dynamics within their environments, and the challenges victims face in recognizing scams. Using semi-structured interviews, we asked scam victims (n=19) aged 60 years and above about their personal and structural circumstances as well as their individual assessment of the impact of their being victimized. Despite high levels of education and computer literacy among our sample, their victimization occurred far too frequently, which prompts a call for the revision of existing approaches toward helping older adults overcome scam victimization.  

  Security Journal (2025) 38:49

Superhighway Robbery

By Graeme R. Newman and Ronald V. Clarke

In Superhighway Robbery, Graeme Newman and Ronald Clarke provide a grounded, pragmatic analysis of how the digital revolution didn't necessarily create new types of criminals, but rather provided them with a much more efficient set of tools. They move away from the sensationalized "hacker" myths of the early 2000s to focus on the cold reality of Situational Crime Prevention. The book's central thesis is that the internet acts as a vast infrastructure—a superhighway—that significantly reduces the effort required to commit traditional crimes like theft, fraud, and piracy while increasing the potential rewards and lowering the risk of being caught.

By applying their famous CRAVED model to the digital world, the authors explain that data and software are the ultimate targets because they are easily concealable, removable, and available. They argue that the most effective way to stop cybercrime is not to wait for a change in human nature, but to change the digital environment itself. This involves "designing out" crime by making digital targets harder to reach and less profitable to exploit. Ultimately, Newman and Clarke strip away the mystery of the "Information Age" to reveal that cybercrime is essentially a matter of opportunity, and by closing those digital windows of opportunity, we can make the superhighway a significantly safer place.

In the digital realm, the CRAVED model explains why certain data or media becomes a prime target for "superhighway robbery." Concealability is at an all-time high because digital files take up no physical space and can be hidden in encrypted folders or behind innocuous filenames, making them easy to possess without detection. These files are incredibly Removable because they can be copied or moved across the globe in milliseconds, allowing a thief to "steal" an item while the original remains in place. The Availability of these targets is virtually limitless; once a movie or piece of software is uploaded to a server, it is accessible to anyone with a connection, twenty-four hours a day.

The Value of digital goods remains high because they often represent thousands of hours of professional labor or sensitive personal information that can be sold on the dark web. These items are also highly Enjoyable, as they often consist of popular entertainment, games, or high-end tools that people naturally want to use. Finally, they are perfectly Disposablebecause there is a massive, ready-made market of willing buyers or downloaders, ensuring that a criminal can quickly offload their "loot" for profit or social capital without the logistical headaches of physical fencing.

Cullompton, Devon. UK. Willan. 2003.

Numismatic Forgery

By Charles M. Larson

In "Numismatic Forgery," author Charles M. Larson pulls back the curtain on one of the most secretive and sophisticated threats to the world of coin collecting.1 Far from a simple historical overview, this book serves as a definitive guide to the dark art of the "super-forger," detailing the methods used to deceive even the most seasoned experts.

Larson provides a deep dive into the technical evolution of counterfeiting—from the crude cast copies of the past to the modern, high-precision struck forgeries that haunt the current marketplace. By meticulously explaining the tools of the trade, including centrifugal casting, pressure casting, and the creation of deceptive dies, Larson equips collectors, dealers, and historians with the knowledge necessary to spot the subtle "tells" of a fake.

Key features of this essential numismatic reference include:

  • The Forger's Toolkit: A step-by-step examination of the physical processes used to create counterfeit currency.

  • Detection Techniques: Practical advice on identifying "transfer marks," edge filing, and suspicious luster.

  • Case Studies: Real-world examples of famous forgeries that have infiltrated major collections.

  • The Ethics of the Hobby: A sobering look at how forgery undermines the historical integrity of numismatics.

Whether you are a casual hobbyist or a professional dealer protecting a million-dollar inventory, "Numismatic Forgery"is an indispensable resource for anyone who wants to ensure that the history they hold in their hands is the real deal.

Policy Thoughts on Bounded Rationality of Identity Thieves

By Graeme R. Newman

This essay critiques a study by Copes and Vieraitis regarding the "bounded rationality" of identity thieves, arguing that a focus on offender psychology and rationalizations is insufficient for developing effective crime reduction policies[cite: ]Newman contends that current criminal justice approaches rely too heavily on punishment and victim vindication, which, while politically satisfying, fail to reduce the prevalence of identity theft.

The author advances the following arguments regarding the development of effective policy:

* Policies based on the "deep psychology" of offenders or their denial of victims are largely fruitless because these rationalizations are often unconscious defense mechanisms. Instead of asking “why” offenders commit crimes, policy should focus on “how” they are accomplished.

* Newman distinguishes between crime mitigation (reducing damage to victims) and crime prevention (reducing the number of crimes)[cite:. While legislation and credit reporting agencies have improved mitigation efforts for victims, these measures do not address the root causes of the crime.

* Effective prevention must target the technological and business arrangements that create opportunities for theft. This involves shifting focus from the offender to the "significant players" (businesses) who can implement standard security procedures, such as the use of PINs for credit cards, to harden targets.

* The essay concludes that businesses often view fraud merely as a cost of doing business rather than a crime to be prevented[cite:. Therefore, the government must establish policies that compel businesses to accept responsibility for crime reduction and eliminate the opportunities they create through their products and services[cite.

Criminology and Public Policy Vol. 8. Issue 2.

Classical Deception: Counterfeits, Forgeries and Reproductions of Ancient Coins

Wayne G. Sayles:


Classical Deception is a detailed and accessible exploration of the long history of counterfeit ancient coins and the methods by which they are produced, detected, and sometimes unwittingly circulated within the numismatic world. Designed for collectors, students of antiquity, and museum professionals alike, the book traces forgery practices from antiquity to the modern era, showing that imitations have accompanied genuine coinage for as long as coins have existed. Sayles examines a spectrum of deceptions — from ancient contemporary counterfeits meant to pass in daily commerce, to the sophisticated modern forgeries that challenge even seasoned experts.

A substantial portion of the book profiles well-known forgers, documenting their techniques, motives, and the specific pieces they produced. Sayles pays particular attention to the prolific work of modern reproduction artists, including Peter Rosa, whose replicas are widely encountered and often misunderstood by beginning collectors. More than 200 photographs allow readers to visually compare authentic coins with their deceptive counterparts, highlighting telltale markers in style, fabric, metallurgy, and die workmanship.

Sayles also introduces the scientific and observational tools available to detect fakes — from simple weight measurement and magnified study of surfaces to metallurgical testing, microscopy, and imaging technologies. Throughout, he emphasizes practical guidance: what warning signs to look for, how to assess provenance, and how to avoid costly errors in the marketplace.

Ultimately, Classical Deception serves both as a cautionary manual and as a historical study of ingenuity, fraud, and craftsmanship. It equips the reader to navigate the hazards of collecting while deepening appreciation for the authentic artistry of ancient coinage.

Perspectives on Identity Theft

By Megan M. McNally and Graeme R. Newman

From the cover: There has been a glaring lack of scholarly attention to the crime of identity theft, according to the editors. The chapters in this volume attempt to fill some of this gap by exploring theory and research on identity theft, as well as situational measures to prevent its occurrence.

The editors' introduction outlines several key issues related to the definition, extent and commission of identity theft. The chapter by Graeme Newman applies the opportunity perspective to the study of identity theft. Megan

McNally uses the "script" approach to examine the meaning and mechanics of identity theft in all of its forms. Henry Pontell, Gregory Brown and Anastasia Tosouni present new findings on how identity theft affects victims, based on data collected by the Identity Theft Resource Center. Heith Copes and Lynne Vieraitis describe how a sample of identity theft offenders viewed their crimes. Michael Levi recounts the evolution of identity fraud and its control in the U.K. Russell Smith presents a framework for evaluating preventive measures, particularly document-based systems, biometric technologies and identity cards. Sara Berg considers how information technology can be used within a situational crime prevention framework to fight identity theft. Robert Willison examines the use of situational crime prevention to protect sensitive personal information in the context of information systems security.

Crime Prevention Studies, volume 23. Willan Publishing. Culmcott House, Uffculme, Cullompton Devon EX 15 3AT, U.K. 2008. 195p.

Abnormal Man : Volume 2 - Bibliography

By Arthur MacDonald.

The narrative in Volume 1 asks many pointed questions: What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

The Read-Me.org edition Volume 1 presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy. To make such work, much of it controversial then as it is today, minimally believable, requires extensive documentation. The voluminous Bibliography of Abnormal Man reproduced here in Volume 2, contains all that Macdnald referred to within his detailed exposition. To some, his arguments may seem unsupported, or lacking in evidence. But he left no stone untuned as this amazing bibliographical documentation of all relative contemporary research

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 240p.

Abnormal Man : Volume 1 --Digest of Literature

By Arthur MacDonald. Introduction by Graeme R. Newman

What does it mean to be “abnormal”? Who decides? And how have these judgments shaped modern science, education, and criminal justice?

First published in 1893, Arthur MacDonald’s Abnormal Man is one of the earliest American attempts to systematically study human difference through the emerging tools of psychology, anthropology, and criminology. Drawing on international research—from European criminal anthropology to American child-study movements—MacDonald sought to classify the physical, mental, and moral traits considered “aberrant” in his era. His work reflects the hopes and anxieties of a society confronting rapid industrialization, immigration, social change, and new scientific approaches to crime and mental health.

To the modern reader, Abnormal Man reveals both the ambition and the pitfalls of nineteenth-century science. Its pages contain pioneering observations about child development, deviance, and social responsibility, alongside early theories—now discredited—about heredity, physiognomy, and race. What emerges is a vivid and sometimes unsettling portrait of a culture striving to understand human variation without the benefit of modern psychology or ethical safeguards.

This new Read-Me.org edition presents Abnormal Man as both a historical artifact and a gateway to critical reflection. It illustrates how scientific thought evolves, how cultural bias can shape research, and how early debates about abnormality laid the groundwork for contemporary approaches to mental health, special education, criminology, and social policy.

A foundational text at the crossroads of science and society, Abnormal Man invites readers to explore the origins of modern debates about deviance, diversity, and the boundaries of the “normal.”

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. p.193.

A Primer in Private Security: Revived edition

By Mahesh Nalla and Graeme Newman

When the first edition of A Primer in Private Security was published, its principal purpose was to demonstrate that private policing was not a mere auxiliary to public law enforcement but a robust and rapidly growing institution with its own organizational forms, priorities, and traditions. At that time, the Hallcrest Report had just confirmed that private security personnel outnumbered public police officers in the United States, a landmark finding that set the tone for debates about the privatization of policing .

Nearly four decades later, the central argument remains as relevant as ever, but the field itself has changed dramatically. Private security is now not only a supplement to public policing but a global, technologically sophisticated industry involved in nearly every sector of modern life. While we think that the original book still remains relevant to security today, we suggest in this preface that the reader approach the content from the point of view of four major perspectives that dominate security  (the word “private” seems old fashioned and less appropriate given that what is public and what is private have become incredibly and interwoven largely as a result of media, especially social media). 

The four perspectives are:

1.     the domestic sphere of home and family,

2.     the economic sphere of business,

3.     the public sphere of local and state government, and

4.     the international sphere of global security and climate-related risk.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 183p.

THE CRIME Volume 3.

BY Richard Grelling.. Translated By Alexander Gray. Introduction by Colin Heston.

Richard Grelling’s The Crime (Das Verbrechen), translated into English by Alexander Gray and published in London and New York between 1917 and 1919, is conceived as both a moral successor and completion to his earlier pacifist landmark, J’Accuse!, written between August 1915 and November 1916. In creating this extended work, Grelling sought to underscore the causes of World War I and dissect the self-justifying rhetoric that sustained the conflict long after its outbreak. Volumes I and II lay foundational groundwork, tracing the immediate antecedents of the war: imperialist tendencies within Germany and, on the part of the opposing Entente powers, ostensibly defensive motives followed by trait protectionism.

Never before in the annals of humankind has a crime of such sweeping magnitude been committed—and seldom has its perpetration been met with denial so unashamed. Within the very citadels of reason and culture, a proud civilization unleashed catastrophe under the guise of necessity—only to scramble afterward in self-exculpation. It is in this spirit of moral defiance—standing firm against voices of dissent, even from one’s own kin—that The Crime is offered to you. In the trilogy’s third volume, Grelling moves beyond the origins of war into the heart of wartime rationalization, exposing the “war-aims” that enabled aggression to persist under the cloak of purpose. May this work cast a clear light upon the structures of self-deception that allowed the world’s descent, and may it stir an unyielding clarity in us to recognize—and reject—such patterns again.

Read-Me.Org Inc. New York-Philadelphia-Australia. 2025. 261p.

Drugs of Abuse: A DEA Resource Guide, 2024 Edition

UNITED STATES. DRUG ENFORCEMENT ADMINISTRATION

From the document: "Education plays a critical role in preventing substance use and misuse. 'Drugs of Abuse, A DEA Resource Guide,' is designed to be a reliable resource on the most commonly used and misused drugs in the United States. This comprehensive guide provides important information about the harms and consequences of drug use by describing a drug's effects on the body and mind, overdose potential, origin, legal status, and other key facts. 'Drugs of Abuse' also offers a list of additional drug education and prevention resources, including the DEA websites: www.DEA.gov[;] www.JustThinkTwice.com, aimed at teenagers[;] www.GetSmartAboutDrugs.com, designed for parents, educators, and caregivers[;] www.CampusDrugPrevention.gov, for higher education[; and] www.OperationPrevention.com, for opioid curricula[.]"

UNITED STATES. DRUG ENFORCEMENT ADMINISTRATION. 2024. 117p.

Voting System Security Measures

By: US Election Assistance Commission

The security of voting systems is essential to a trustworthy election. Every state and local jurisdiction utilizes common-sense procedures and tools to safeguard the voting process. Common best practices include using locks, tamper-evident seals, security cameras, system testing before and after elections, audits, and physical and cybersecurity access controls. This guide outlines some of the many best practices local election officials follow to secure voting systems through an election cycle. It's important to note this is a broad list of common security measures and procedures to protect the integrity of an election. The types of security measures may vary based on the voting systems in use in state and local jurisdictions.

United States. Election Assistance Commission, Oct 2024

Adolescent Substance Use: Risk and Protection

By Economic and Social Commission for Asia and the Pacific United Nations Office on Drugs and Crime

References: This section lists numerous studies and reports related to adolescent substance use, risk factors, and protective measures. It includes works by Jessor, the National Institute on Drug Abuse (NIDA), the World Health Organization (WHO), and others.

Focus Areas: The references cover various topics such as community psychiatry, correctional boot camps, life skills approaches, and traditional therapies.

Research and Guidelines: Many references are linked to guidelines and evaluations from international organizations like WHO and the United Nations, focusing on treatment and prevention strategies for substance use disorders.

United Nations, 2003, 57

Shattered Lives: Sexual Violence during the Rwandan Genocide and its Aftermath

By Human Rights Watch

During the 1994 Rwandan genocide, sexual violence was rampant, with thousands of women being raped, mutilated, or forced into sexual slavery by militia, soldiers, and civilians[. The violence was primarily directed at Tutsi women due to their ethnicity and gender, often following the torture and killing of their relatives. Survivors face severe social stigma, health issues, and poverty. Many women are now heads of households, dealing with the aftermath of the genocide. International Response Efforts include support for judicial training, victim protection, and financial aid, but challenges remain in effectively addressing gender-based crimes and supporting survivors.

Human Rights Watch New York· Washington· London· Brussels. 1996. 109p.

Sisters in Pain : Battered Women Fight Back

Linda Elisabeth LaPinta and Mary Angela Shaughnessy

Focus on Battered Women: The book, "Sisters in Pain," highlights the stories of battered women in Kentucky who fought back against their abusers, emphasizing their struggles and resilience.

Legal and Social Challenges: It discusses the legal and social challenges these women faced, including the lack of enforcement of domestic violence laws and the societal norms that perpetuate abuse.

Personal Narratives: The book includes personal narratives and interviews with the women, providing a deep, personal look into their experiences and the impact of abuse on their lives.

Call for Change: The authors aim to raise awareness and inspire action to improve the legal and social systems that fail to protect victims of domestic violence.

University Press of Kentucky, 2014, 214 pages

Men and Rape: Theory, Research, and Prevention Programs in Higher Education

Edited by Alan D. Berkowitz

Focus on Men: The document emphasizes the responsibility of men in preventing rape and provides resources for professionals in higher education to work with college men on this issue.

Research and Theory: It reviews empirical research on college men as perpetrators of sexual assault and proposes an integrative theoretical model for rape prevention programs.

Prevention Programs: It describes a model acquaintance rape prevention program for men, including program philosophy, facilitator selection and training, content, and evaluation.

Student Perspectives: Insights from student facilitators who participated in rape prevention programs, highlighting their experiences and the impact of these programs.

Jossey-Bass, 1994, 91 pages

National Burden of Injury and Deaths From Shootings by Police in the United States, 2015–2020

By Julie A. Ward, Javier Cepeda, Dylan B. Jackson, Odis Johnson, Daniel W. Webster and Cassandra K. Crifas

Objectives.To describe all-outcome injurious shootings by police and compare characteristics of fatalversus nonfatal injurious shootings nationally.Methods.From July 2021 to April 2023, we manually reviewed publicly available records on all2015–2020 injurious shootings by US police, identified from Gun Violence Archive. We estimated injury frequency, case fatality rates, and relative odds of death by incident and victim characteristics.Results.A total of 1769 people were injured annually in shootings by police, 55% fatally. When a shooting injury occurred, odds of fatality were 46% higher following dispatched responses than police-initiated responses. Injuries associated with physically threatening or threat-making behaviors,behavioral health needs, and well-being checks were most frequently fatal. Relative to White victims,Black victims were overrepresented but had 35% lower odds of fatal injury when shot.Conclusions.This First multi-year, nationwide analysis of injurious shootings by US police suggests that injury disparities are underestimated by fatal shootings alone. Non-policing responses to social needs may prevent future injuries.Public Health Implications.We call for enhanced reporting systems, comprehensive evaluation of emerging reforms, and targeted investment in social services for equitable injury prevention.

American Journal of Public Health, 2024. 11p.

Harassment and Violence Against Health Professionals Who Provide Reproductive Care Proceedings of a Workshop–in Brief

By The National Academies of Sciences, Engineering, and Medicine. 

In December 2023, the National Academies hosted a public webinar in which medical and human rights experts explored concerns related to harassment, threats, and physical attacks against health care professionals working to provide essential reproductive health care. The event was the fourth in a webinar series designed to consider society-wide effects of limits to reproductive health care access in the U.S. following the 2022 Supreme Court Decision in Dobbs v. Jackson Women's Health Organization. This Proceedings of a Workshop-in Brief highlights the presentations and discussions that occurred at the webinar.

Washington, DC: The National Academies Press. 2024. 9p.