Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in Social Science
Monitoring Online Illegal Wildlife Trade. Insights From Brazil and South Africa 

By Global Initiative Against Transnational Organized Crime 

The last decade and a half has seen an alarming surge in illegal wildlife trade (IWT) on the internet. However, a dearth of data regarding the scale of the market, its dynamics, operations and ramifications, especially on a global scale, is a significant hindrance to combating this crime. To address this, ECO-SOLVE is developing a Global Monitoring System (GMS) to systematically monitor global online IWT and gather data to feed into law enforcement activity and to inform policymaking. The GMS is a network of data hubs in countries whose domestic online markets are considered the largest or most consequential in their regions. The GMS’s national monitoring nodes are being set up in a staggered process and the size and scope of the network will grow with each edition of the Report. This Global Trend Report draws on data from two national data hubs: Brazil and South Africa. By identifying areas of high pressure on endangered species and ecosystems, monitoring may enable targeted interventions and inform law enforcement action to prosecute those responsible for wildlife crimes. Additionally, monitoring can help detect emerging trends and shifts in the trade, allowing for timely and effective responses to new threats and challenges. This is the second publication in a series of Global Trend Reports that aim to showcase and contextualize trends in online IWT. Reports will be published throughout the three years of the ECO-SOLVE project, with about two to four reports released per year. Drawing on findings generated by the GMS, each Global Trend Report will highlight the latest trends in statistical data, including the number of advertisements found, the species advertised as well as the platforms that host these adverts. Diving deeper into individual topics, the reports will offer regional breakdowns and include sections that contextualize and analyze findings, while also investigating changes in regulations and their effects on online IWT as well as trends in law enforcement. The reports will also discuss case studies of online IWT. Following the structure of the first Global Trend Report, the second issue begins with a trend analysis of online IWT drawing on data from regular monitoring carried out between May and July 2024 by GMS data hubs in Brazil and South Africa. The report then takes a closer look at the online and offline illegal trade in Pirarucu in Brazil, as well as the trade routes used and links to cocaine markets. The third section presents a case study of the illegal wildlife trade as linked to traditional medicines in South Africa, highlighting gaps around regulations and enforcement.   

Geneva:  Global Initiative Against Transnational Organized Crime, 2024. 33p.

The recruitment of young perpetrators for criminal networks 

By Europol

This intelligence notification is based on information contributed to Europol by national law enforcement authorities. This document aims to raise awareness of the ways criminal networks exploit minors, particularly through recruitment and tasking via social media. It highlights the use of targeted language, coded messaging, and "gamification" strategies in this process. The recruitment of minors into serious and organised crime and terrorism is not a new phenomenon; however, it has increasingly become a tactic used by criminal networks to avoid detection, capture, and prosecution. In recent years, this trend has expanded across more countries, with recruitment methods evolving and minors being tasked with violent acts such as extortion and killings  

Paris: Europol: 2024. 3p.

Understanding Toxic Panda: The New Cyber Threat Targeting Data Security

By Asmita Mallick and Prithwish Ganguli

Toxic Panda is a sophisticated Android banking trojan that targets users in Europe, Latin America, and Southeast Asia. Using advanced techniques like account takeover (ATO) and on-device fraud (ODF), it bypasses security mechanisms, including multi-factor authentication, to steal sensitive data and conduct unauthorized transactions. The malware's ability to manipulate user inputs and intercept one-time passwords makes it a significant threat. This paper explores the implications of ToxicPanda, highlights the evolving landscape of cybercrime, and offers insights into preventive measures and legal frameworks to combat emerging threats.

Unpublished paper, 2024.

Evidence on Pornography’s Influence on Harmful Sexual Behavior Among Children

By The Children’s Commissioner for England

This is the second in a series of reports investigating the impact of pornography on young people, building upon the Children’s Commissioner’s report published in January 2023, “A lot of it is actually just abuse”, which set out findings from a survey of over a thousand 16-21-year-olds and focus groups with teenagers. This series of work shows the detrimental effect that pornography is having on children and young people. It adds weight to the Children’s Commissioner’s view that no child under the age of 18 should be able to access pornography. This report aimed to discover whether references to specific acts of sexual violence commonly seen in pornography could be found in official documents relating to the investigation of children who abused other children. It is not intended to be read by children, but by researchers and policy makers interested in making children safer. It makes frequent reference to sexual harassment and sexual violence, and includes descriptions of pornographic content, language, and discussion of sexual abuse. This content may be difficult to read, however, we think it is important to understand how pornography impacts children, in order that we may better protect all children from harm. The research contained within this report synthesises data from 502 documents of two types: 379 Achieving Best Evidence (ABE) transcripts of interviews with children who have been sexually harmed and children who have sexually harmed another child, from one police force, and 123 Sexual Assault Referral Centre (SARC) documents concerning children who were sexually harmed by other children from one NHS foundation trust.   

London: Children's Commissioner for England, 2023. 58p.

Enhancing Intelligent Surveillance: A Hybrid Deep Learning Approach for Anomaly Detection, Violence Recognition, and Person Re-Identification" 

By Evany Anne Moses,  M. Brindha,  N. Sivaukumaran

In recent years, the demand for intelligent surveillance systems has grown significantly due to the increasing need for enhanced security in public and private spaces. This journal presents a comprehensive approach that integrates advanced deep learning techniques for anomaly detection, violence recognition, and person re-identification in surveillance videos. The proposed system leverages a hybrid model combining ResNet50 and 3D Convolutional Neural Networks (CNNs) to accurately detect violent activities in real time. Additionally, the system includes anomaly detection to identify unusual patterns in the video feed that may signal potential security threats. The system further incorporates YOLO for high-precision object detection, DeepSort for robust tracking, and OpenPose for pose estimation, enabling real-time monitoring and accurate identification of individuals across multiple frames. Experimental results demonstrate that the integrated system outperforms traditional methods in terms of accuracy, efficiency, and scalability, making it a powerful tool for modern surveillance applications. This work highlights the potential of combining multiple deep-learning approaches to create a more effective and reliable surveillance system capable of addressing diverse security challenges.

Unpublished paper, 2024. 34p.

Pornography Exposure and Access Among Young Australians: a Cross-Sectional Study

By  Maree Crabbe, Michael Flood,,  Kelsey Adams

This article aims to explore the extent and nature of Australian young people’s pornography exposure and access.

Methods

Cross-sectional online survey of 1,985 young Australians aged 15–20 years, nationally representative of a range of demographics.

Results

Exposure to pornography was reported by 86% of male and 69% of female participants. Most exposure occurred when participants were alone and at home, regardless of gender. Young men were more likely than young women to seek pornography out and to view it frequently, with over half (54%) of male participants reporting weekly use compared with 14% of female participants. On average, boys and young men saw pornography 3.2 years before their first partnered sexual experience, and girls and young women saw it 2.0 years before theirs.

Conclusions

It is common for young people to see pornography years before their first partnered sexual experience.

Implications for public health

Unintentional and deliberate exposure to pornography is common and frequent among young people. Public health strategies among young people are necessary to address the potential harms associated with pornography use, including gender-based violence and risky sexual practices.

Australian and New Zealand Journal of Public Health Volume 48, Issue 3, June 2024, 100135

GangstaLife: Fusing Urban Ethnography with Netnography in Gang Studies

By Marta-Marika Urbanik & Robert A. Roks

Recent research on street-involved populations has documented their online presence and has highlighted the effects of their online presentations on their lives in the real world. Given the increasing conflation between the online and offline world, contemporary urban ethnographers should pay increased attention to their participants’ online presence and interactions. However, methodological training of this sort is still in its infancy stages and has not yet evolved to guide the growing number of researchers undertaking this form of research. This article draws from our experiences using social media in our urban ethnographies with criminally involved groups, to examine the benefits, risks, and challenges of drawing on social media in urban ethnography. It is intended to serve as a foundational piece that will hopefully ignite scholarly dialogue, debate, and methodological training relating to deploying social media in urban—and specifically—gang ethnography.

Qualitative Sociology 43(6) 2020.

“Say it’s Only Fictional”: How the Far-Right is Jailbreaking AI and What Can Be Done About It  

By Bàrbara Molas and Heron Lopes

This research report illustrates how far-right users have accelerated the spread of harmful content by successfully exploiting AI tools and platforms. In doing so, it contributes to improving our understanding of the misuse of AI through new data and evidence-based insights that may inform action against the dissemination of hate culture through the latest technologies.  

  The Hague: The International Centre for Counter-Terrorism (ICCT), 2024. 27p.

Phishing Risks in a University Student Community

By Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias and Yuguang Ipsen

In an exploratory quasi-experimental study, 138 students recruited during a university orientation week were exposed to social engineering directives in the form of fake emails, or phishing, over several months in 2017. The study assessed the risks of cybercrime for students by observing their responses. Three types of scam emails were distributed that varied in the degree of individualisation: generic, tailored, and targeted or ‘spear’. The study explored the influence of scam type, cybercrime awareness, gender, IT competence and perceived internet safety on susceptibility to email scams.Although tailored and individually crafted email scams were more likely to induce engagement than generic scams, differences were not significant. Analysis of the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students.


Trends & issues in crime and criminal justice no. 587. Canberra: Australian Institute of Criminology. 2020. 16p.

Uncovering The Ecosystem of Intellectual Property Crime: A Focus on Enablers

By Europol 

Intellectual property (IP) crime refers to the theft, infringement and unauthorised use of intellectual property ( 1 ) such as copyrights, designs, trademarks, patents, and geographical indications of origin, and crimes related to trade secrets. Common types of IP crime include counterfeiting (the manufacture, importation, distribution, storage and sale of goods that falsely carry the trademark of a genuine brand without permission) and piracy (the unauthorised copying, use, reproduction, and distribution of materials protected by intellectual property rights). IP crime continues to pose a threat to the EU’s internal security ( 2 ). The harm produced by IP crime is more significant than it appears at first sight. Not only because of its adverse economic effects, but especially in terms of impact on consumers’ health and safety, and on the EU’s natural environment. Criminal actors operating in IP crime are very adept at exploiting opportunities and loopholes, posing challenges to right holders, law enforcement and other relevant authorities. The scale of crime remains considerable. In 2022, approximately 86 million fake items were seized in the EU, with an estimated value exceeding EUR 2 billion. The most common products seized were games ( 3 ), packaging materials, toys, cigarettes, and recorded CDs/DVDs. 60 % of the goods were detained within the EU, and 40 % at the EU’s borders ( 4 ). The illegal trade in counterfeit goods was estimated to represent 5.8% of imports to the EU( 5 ). IP crime thrives because it fulfils a worldwide demand for low-priced goods, which is satisfied by criminal actors and networks operating across continents. Despite prevention campaigns to expose the health and safety dangers of purchasing and consuming counterfeit goods, besides the severe consequences for the industries and companies targeted, counterfeiting keeps appealing to or misleading consumers. IP crime entails a complex criminal process involving multiple steps and various actors. The infringement of intellectual property rights is only the initial stage of IP crime, as the final objective of counterfeiters is to profit as much as possible from the subsequent illicit sale of the fake goods introduced into the consumers’ market. IP crime relies on a multitude of enablers that make this criminal activity particularly successful and at the same time difficult to tackle. These enabling factors can be crimes in themselves, but can also be lawful activities misused for facilitating IP crime. This report explores the ecosystem of IP crime and its interactions with developments in our society. At the core of the report is a description of the criminal process by which the various types of IP crime are committed and the steps it entails. It assesses which key catalysts in today’s EU and global society drive IP crime, making it an area of opportunity for criminal actors. It zooms in on those factors – be they criminal acts or lawful activity misused for criminal purposes – that enable IP crime. At the same time, it considers how IP crime can function as an enabler of other serious and organised crimes. Ultimately, it describes IP crime’s harmful impact on EU citizens and  This report uses operational data from investigations contributed to Europol. The EUIPO has also collected contributions by the private sector. Case examples are used throughout the report as illustrations. Where relevant, open-source intelligence has been used to corroborate analytical findings. The focus on enablers invites law enforcement authorities (LEAs), legislators, relevant stakeholders and the public to work even more closely to reduce the harm of IP crime and identify the criminals behind it. A cohesive response by all stakeholders, both within and outside the EU, is a prerequisite toward the detection and dismantling of the criminal networks involved

Luxembourg: Publications Office of the European Union , 2024. 45p.

The Real 'Bond Epidemic': Misinformation, False Narratives, and Bias in the Media

By Elaine Hennig and Benjamin Greaves

Since Harris County’s misdemeanor bond system was first declared unconstitutional by a federal district court in 2017, the county has implemented several reforms as part of the resulting settlement. Before the resolution of the lawsuit, indigent defendants were detained pretrial solely based on their inability to pay bond, while their wealthier counterparts could post bond and expect prompt release. The county corrected this wealth-based discrimination by requiring the majority of misdemeanor defendants to be released on personal recognizance (PR) bonds, which do not require an upfront cash payment. By providing defendants with a new system for bonding out of jail that does not discriminate based on income, the implemented reforms ensure that defendants are not prematurely punished with jail time— upholding the principle of a ‘presumption of innocence’ for the criminally accused, and preventing taxpayers from footing the bill for unnecessary weeks or months of incarceration. Though these changes have only been applied to misdemeanor cases, several ongoing lawsuits have set the stage for reforms that could similarly improve the felony bond system. While these two systems are legally different, the rationale for reform remains the same: protecting constitutionally guaranteed rights and preventing wealth-based discrimination. Despite the more equitable reforms to Harris County’s misdemeanor system, opponents of bond reform frequently criticize the changes. Though many opponents still claim to support the principles of reform, they regularly scapegoat bond reform for the various failures of the criminal legal system. Through the use of misinformation, propagation of false narratives, and exploitation of race-based disparities, they portray bond reform as a threat to public safety. Unfortunately, this disinformation effort is facilitated by local media outlets, who amplify the voices of opponents and disseminate the narratives they promote. This report aims to examine media coverage of bond in Harris County, and to better understand the media’s role in shaping the narrative of bond reform. It draws on a content analysis of 226 news articles run by six Houston-area television stations between January 2015 and June 2021. Stories qualified for selection if they discussed bond reform, bond debates, and/or people who allegedly committed crimes while out on bond. While bias in coverage was the primary focus of this analysis, we also reviewed 15 other key variables, such as referenced ‘experts’ and the defendant’s race or ethnicity. This analysis reveals that many local media stations disproportionately publish biased articles in their reporting on bond. The media consistently provide a platform for opponents of bond reform to represent bond release as a threat to public safety, while frequently failing to contextualize opponents’ claims or feature an alternative view. In cherry-picking and sensationalizing stories about defendants who are arrested while out on bond, media outlets construct a distorted narrative of dangerous releasees, in effect exaggerating the risks of bond reform and minimizing its positive impact. These efforts continually undermine bond reform, serving only to generate fear of people released on bond pretrial. The shift in news coverage of bond is perhaps best seen through a comparison of coverage prior to and following the implementation of Harris County’s proposed settlement in 2019. Over the 48-month period from January 1, 2015, to December 31, 2018, 42 total articles focused on bond in relation to  reform or released defendants. Of those articles, only 33 percent were found to be negatively biased. In contrast, over a shorter 30-month period from January 1, 2019, to June 30, 2021, not only did the number of bond-focused articles more than quadruple to 184, but the percentage of negatively biased articles nearly doubled to 61. Although bias in media coverage is one of the most—if not the most—alarming variables analyzed in this report, several other variables have revealed similarly concerning trends. With ongoing attacks against bond reform efforts in Texas and in Houston specifically, recognizing and correcting these trends in media coverage is critical to ensuring that Harris County residents have a more informed perspective of both misdemeanor bond reform and bond reform more generally.   

Austin: TEXAS CENTER FOR JUSTICE AND EQUITY, 2021. 34p.

Production and Distribution of Child Sexual Abuse Material by Parental Figures

By Michael Salter, WK Tim Wong, Jan Breckenridge, Sue Scott, Sharon Cooper and Noam Peleg

Child sexual abuse material (CSAM) is widely available online. Existing research indicates that the parents and parental figures of victims are notably represented in offender populations. However, there is limited research in this area. Drawing on Australian media and legal databases, this study created a database of 82 cases of CSAM production and distribution perpetrated by parents and/or parental figures from 2009 to 2019. The study found that perpetrators are most often the male parental figures of the victims, and victims are predominately girls under nine years of age. The findings reveal distinct patterns and scenarios of parental CSAM offending that may inform prevention, early intervention and improved responses to victims. The study documented the significant impact of parental CSAM offending on victims and the need for specialist victim support.

Trends & issues in crime and criminal justice no. 616.  Canberra: Australian Institute of Criminology. 2021. 17p.

Criminal mobility of outlaw motorcycle gangs in Australia

By Christopher Dowling and Anthony Morgan

The criminal mobility of outlaw motorcycle gang (OMCG) members presents a significant challenge to Australian governments and police. Examining patterns of mobility can help to better understand the opportunity structures that underpin offending by OMCGs and to drive national collaborative responses to these gangs. This study examines the prevalence and patterns of criminal mobility in a sample of almost 4,000 OMCG members in more than 400 chapters. Around one in 10 members showed evidence of criminal mobility over the long term, while more than one-third of chapters comprised criminally mobile members. Criminally mobile gang members were heavily concentrated in a small number of chapters. Patterns of criminal mobility primarily involve movements into east coast jurisdictions. New South Wales and Queensland emerged as the most common destinations for criminally mobile OMCG members  

Trends & issues in crime and criminal justice no. 619. Canberra: Australian Institute of Criminology. 2021. 16p

How and Why Vendors Sell on Cryptomarkets

By Rasmus Munksgaard and James Martin

Cryptomarkets represent a growing component of the global illicit drugs trade. Australia is over-represented in the proportion of online vendors who use these platforms to reach drug consumers. Despite the growth in online drug trading, relatively little is known about people who use cryptomarkets to sell drugs. This study addresses the knowledge gap and provides qualitative insights into this new, and little understood, cohort of offenders. The study found that vendors perceive less risk of violence and police intervention when selling drugs online and that the potential for profit exceeds that available when selling drugs offline.

Trends & issues in crime and criminal justice no. 608. Canberra: Australian Institute of Criminology. 2020. 12p.

Responding to Cybercrime: Results of a Comparison Between Community Members and Police Personnel 

By Cassandra Cross, Thomas Holt, Anastasia Powell and Michael Wilson 

Advancements in information technology are sources of both opportunity and vulnerability for citizens. Previous research indicates that there are significant challenges for police in investigating cybercrime, that community expectations about police responses are based largely on media representations, and that victims experience high levels of frustration and stigmatisation. This paper examines the views of the Australian community and law enforcement officers about the policing of cybercrime. Results suggest that police personnel are more likely to view cybercrime as serious, and community members are more likely to ascribe blame to victims. Results also indicate a discrepancy between police and community members in their views of the efficacy of police responses. These discrepancies contribute to public dissatisfaction. Therefore, the paper covers some general strategies for short- and long-term cybercrime prevention.

Trends & issues in crime and criminal justice no. 635. Canberra: Australian Institute of Criminology. 2021. 20p.

The Identity Theft Response System 

By Megan Wyre, David Lacey and Kathy Allan

Identity theft continues to grow in prevalence and complexity. Despite this growth, little is known about the identity theft response system and how it assists victims to recover. This study examines the response system by analysing 211 identity theft cases reported to IDCARE, a national identity and cybercrime victim support service. The study applies a sociotechnical systems methodology to establish the social, task and information processes of the Australian identity theft response system. The study also examines identity theft victims’ response activities and needs over a 12-month period. The identity theft response system is almost entirely dependent on the victim to respond to and limit the harm caused by identity theft. Overall, the response system is disjointed and lacking in coordination. 

Trends & issues in crime and criminal justice no. 592.  Canberra: Australian Institute of Criminology. 2020. 18p.

Immigrants and Crime in the United States 

By Ariel G. Ruiz Soto

Immigrants in the United States commit crimes at lower rates than the U.S.-born population, notwithstanding the assertion by critics that immigration is linked to higher rates of criminal activity. This reality of reduced criminality, which holds across immigrant groups including unauthorized immigrants, has been demonstrated through research as well as findings for the one state in the United States—Texas—that tracks criminal arrests and convictions by immigration status. A growing volume of research demonstrates that not only do immigrants commit fewer crimes, but they also do not raise crime rates in the U.S. communities where they settle. In fact, some studies indicate that immigration can lower criminal activity, especially violent crime, in places with inclusive policies and social environments where immigrant populations are well established. A Look at the Overall Immigrant Population National studies have examined incarceration rates and prosecutions of immigrants in the country, overwhelmingly finding that immigrants of all legal statuses commit crimes at lower rates than those who were born in the United States. Immigrants Are Prosecuted and Imprisoned at Lower Rates than the U.S. Born Immigrants in the United States have had lower incarceration rates than the native-born population since at least 1870 (when such data were first recorded). In 2020, immigrants were 60 percent less likely to be incarcerated than the U.S. born, according to a study by the National Bureau of Economic Research. And though a 2021 Justice Department study points out prosecutions of immigrants increased between 1990 and 2018, nearly 90 percent were for violations of immigration-related laws. Notably, U.S. born citizens were ten times more likely than immigrants to be incarcerated for committing weapons- related offenses, five times more likely for violent offenses, more than twice as likely for property crimes, and nearly twice as likely for drug offenses.  At the state level, multiple studies have found there is no clear relationship between violent crime and immigration. And research at the city level suggests that increases in immigration can be associated with declining homicide rates, with the largest effect on municipalities with long histories of immigration, as well as reductions in property crimes and robbery. This makes immigrants  less likely to be either offenders or victims of crime at the local level compared to the U.S.-born population

Washington, DC: Immigration Policy Institute, 2024. 5p.   

Economic Crime in the UK: A Multi-Billion Pound Problem

By Oliver Bennett MBE, Ali Shalchi

The precise scale of economic crime in the UK is unknown, but it could run to tens or hundreds of billions of pounds per year. The extent of these crimes – which include money laundering, fraud, and corruption – led the Intelligence and Security Select Committee in its July 2020 report on Russia to note that London is considered a ‘laundromat’ for corrupt money. In December 2019 the Treasury Committee found various regulatory and legislative failings in the way in which these crimes are being tackled. It urged the Government to make improvements to the supervisory system and to introduce new powers to combat economic crime. A February 2022 Treasury Committee follow-up report concluded that the Government was still not prioritizing economic crime sufficiently. In 2019 The Financial Action Task Force (the global money laundering and terrorist financing watchdog) praised the UK’s efforts on the issue, but also found failings and identified a lack of resources for investigating these crimes. The Economic Crime Plan The Government agrees about the need to tackle economic crime, which it says causes “much harm to individuals and communities and damage to legitimate business and the UK’s reputation.” It set out its overall approach to tackling the issue in its July 2019 Economic Crime Plan. The Plan covers the years 2019-2022 and draws together all the work being conducted by the public and private sector. A number of the 52 actions contained in the plan may involve future legislative reforms, including changes to: • the Proceeds of Crime Act to improve how the proceeds of crime can be confiscated; • corporate criminal liability, to punish and prevent economic crimes when committed on behalf of or in the name of companies; • block company stock exchange listings on national security grounds; • improve transparency over UK property ownership; • Companies House powers to enable it strike off from its register dissolved or inactive limited partnerships. Progress with the Plan In February 2022, the Royal United Services Institute said that 40% of actions in the Plan had been completed, 17% were in progress, 23% were overdue, and 19% of actions had no due date. The Government says it is “on course to deliver 49 of the 52 actions” in the Plan. The Treasury Committee has recommended that the Plan be adapted and renewed for a further three years.   

London: UK Parliament, House of Commons Library, 2022. 22p.

State Permissive Behaviours and Commercial Offensive-Cyber Proliferation

By Gareth Mott, James Shires, Jen Ellis, James Sullivan and Jamie MacColl

Commercial cyber tools and services have many legitimate applications, from corporate penetration testing (an authorised simulated cyber attack on an IT system) to law enforcement and national security operations. But they are also subject to misuse and abuse, when they are used in ways that are contrary to national or international law, violate the human rights of their targets, or pose risks to international security. Some states are currently grappling with this policy challenge. Meanwhile, collective international initiatives for action are underway. For example, there is the US’s 2023 Joint Statement on Efforts to Counter the Proliferation and Misuse of Commercial Spyware and the UK- and France-led Pall Mall Process of 2024. Ultimately, one aim of these initiatives is to enable states to harmonise their policy interventions where possible. To inform principles and policies for intervention at national and international levels, it is necessary to understand the dynamics that encourage or facilitate offensive-cyber proliferation. This paper identifies a range of ‘non-state proliferating factors’ (NPFs) and ‘state permissive behaviours’ (SPBs), and its findings draw on desk-based research on the international commercial offensive-cyber market. These findings were supplemented by a data validation and consultative workshop with industry stakeholders held in person at Chatham House in March 2024. This half-day validation workshop drew on the expertise and insights of 44 participants predominantly based in the UK, the US and Western Europe. To facilitate candid discussion, remarks made at the workshop are not attributable, and the identities of participants are not referenced here.

In this paper, NPFs and SPBs are categorised into five areas:

  1. Regulation of corporate structure and governance.

  2. Legal frameworks for product development, sale and transfer.

  3. Diplomatic support and engagement.

  4. Development of cyber-security ecosystem and workforce.

  5. Integration with defence and security industrial base.

Using these categories, this research analyses the roles of both state and non-state actors. It identifies critical inter-relationships between different SPBs and NPFs that serve to facilitate or enable potentially irresponsible offensive-cyber proliferation. This is one of two papers. A second paper, authored by the researchers and published by Chatham House in October 2024, draws on the findings in this paper and identifies a range of ‘principles’ that could be used to build a code of conduct to counter irresponsible offensive-cyber proliferation.

London: Royal United Services Institute for Defence and Security Studies - RUSI and The Royal Institute of International Affairs, 2024. 39p.