Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in Social Science
What Role Does Social Media Play in Violence Affecting Young People? 

By Cassandra Popham, Ellie Taylor and William Teager

The Youth Endowment Fund surveyed over 10,000 teenage children (aged 13-17) in England and Wales about their experiences of violence. The findings are detailed across five reports, each focusing on a different aspect. In this second report, we examine teenage children’s experiences of violence on social media. We aim to understand its prevalence, the nature of the content the children encounter and its impact on their lives. Here’s what we found. Violence is widespread on social media. Exposure to real-life violence on social media has become the norm rather than the exception for teenage children. Our findings reveal that 70% of respondents have encountered some form of real-world violence online in the past 12 months. The most frequently observed content is footage of fights involving young people, with 56% of respondents reporting that they’ve seen such videos. Other common types of violence witnessed online include threats of physical harm (43%) and content related to gang activity (33%) and weapons (35%). Notably, one in nine children who say they’ve encountered weapon-related content have seen footage involving zombie knives or machetes — a figure significantly higher than the 1% of 13–17-year-olds who’ve reported that they carry such weapons, as highlighted in our first report. This suggests that social media may amplify fear by making certain behaviours appear more widespread than they are. Sexually violent content or threats have been reported by more than a quarter of teenage children (27%). For the second year in a row, TikTok is the platform where children are most likely to witness violent content.  While the majority of teenage children encounter violent content online, few actively seek it out. In fact, only 6% of those who’ve come across such content do so intentionally. Most are exposed to it inadvertently: half (50%) have seen it via someone else’s profile or feed, and just over a third (35%) have had it shared directly with them. Alarmingly, 25% of children have reported that the social media platforms themselves promote this violent content through features like ‘Newsfeed’, ‘Stories’ and the ‘For You Page’. This underscores the significant role social media companies play in amplifying exposure to violent content beyond what users might encounter by chance. Seeing violence online has real-world impacts. Viewing violent content online has impacts that extend far beyond the screen. The vast majority (80%) of teenage children who encounter weapons-related content on social media say it makes them feel less safe in their local communities. This perceived threat has tangible consequences: two-thirds (68%) of teenagers who’ve seen weapons on social media say it makes them less likely to venture outside, and 39% admit that it makes them more likely to carry a weapon themselves. The influence of social media doesn’t stop there. Nearly two-thirds (64%) of teenagers who report perpetrating violence in the past year say that social media has played a role in their behavior. Factors like online arguments and the escalation of existing conflicts are commonly cited as catalysts for real-world violence  Children support limiting access to phones and social media. The widespread exposure to real-world violence online may partly explain why many teenagers believe that access to social media should come later than access to smartphones. Our findings highlight the responsibility of social media companies to remove or restrict harmful content. They also point to the need for effective support and education to help children navigate these dangers while still benefiting from the positive aspects that social media can offer.  

London: Youth Endowment Fund, 2024. 28p.

Social media: the good, the bad, and the ugly

By Joint Select Committee on Social Media and Australian Society

This report focusses on the impacts of social media and Australian society. It examines the influence of social media on users' health and wellbeing, particularly on vulnerable cohorts of people, but also how social media can provide users with positive connection, a sense of community, a place for expression and instant access to information and entertainment.

The Committee heard that balancing these conflicting realities is a wicked problem.

The report addresses both the need for immediate action, and the need for a sustained digital reform agenda. It supports protecting Australians through a statutory duty of care by digital platforms, education support and digital competency, greater protections of personal information, independent research, data gathering and reporting, and giving users greater control over what they see on social media.

This report puts Big Tech on notice—social media companies are not immune from the need to have a social licence to operate.

Recommendations for the Australian Government

  1. Consider options for greater enforceability of Australian laws for social media platforms.

  2. Introduce a single and overarching statutory duty of care onto digital platforms for the wellbeing of their Australian users.

  3. Introduce legislative provisions to enable effective, mandatory data access for independent researchers and public interest organisations, and an auditing process by appropriate regulators.

  4. As part of its regulatory framework, ensures that social media platforms introduce measures that allow users greater control over what user-generated content and paid content they see by having the ability to alter, reset, or turn off their personal algorithms and recommender systems.

  5. Prioritise proposals from the Privacy Act review relating to greater protections for the personal information of Australians and children.

  6. Any features of the Australian Government's regulatory framework that will affect young people be codesigned with young people.

  7. Support research and data gathering regarding the impact of social media on health and wellbeing to build on the evidence base for policy development.

  8. One of the roles of the previously recommended Digital Affairs Ministry should be to develop, coordinate and manage funding allocated for education to enhance digital competency and online safety skills.

  9. Reports to both Houses of Parliament the results of its age assurance trial.

  10. Industry be required to incorporate safety by design principles in all current and future platform technology.

  11. Introduce legislative provisions requiring social media platforms to have a transparent complaints mechanism.

  12. Ensures adequate resourcing for the Office of the eSafety Commissioner to discharge its evolving functions.

Parliament of Australia, 18 NOV 2024

Social Media: The Root Cause of Rising Youth Self‐Harm or a Convenient Scapegoat?

By Helen Christensen, Aimy Slade, Alexis Whitton

Recent events have reignited debate over whether social media is the root cause of increasing youth self‐harm and suicide. Social media is a fertile ground for disseminating harmful content, including graphic imagery and messages depicting gendered violence and religious intolerance. This proliferation of harmful content makes social media an unwelcoming space, especially for women, minority groups, and young people, who are more likely to be targeted by such content, strengthening the narrative that social media is at the crux of a youth mental health crisis. However, the parallel rise in social media use and youth mental health problems does not imply a causal relationship. Increased social media use may be a correlate, exacerbating factor, or a consequence of rising trends in youth self‐harm, which may have entirely separate causes. Despite its potential negative impacts, social media is also a source of information and support for young people experiencing mental health problems. Restricting young people's access to social media could impede pathways for help‐seeking. This complexity highlights the need for a considered approach.

Recommendations  

  • Understand why some individuals are more susceptible to social media harms.

  • Assess alternative explanations for youth self-harm trends.

  • Mitigate artificial intelligence (AI)-related risks.

  • Evaluate interventions that restrict social media and ensure they are evidence-based.

Medical Journal of Australia Volume221, Issue10 November 2024 Pages 524-526

Unauthorized Access: The Crisis in Online Privacy and Security

By Robert H. Sloan • Richard Warner

 Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues about online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policymakers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

Boca Raton, FL;  London; New York;  CRC Press, 2017. 401p.

The Philosophy of Online Manipulation

Edited By Fleur Jongepier, Michael Klenk

Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online? This volume provides philosophical and conceptual depth to debates in digital ethics about online manipulation. The contributions explore the ramifications of our increasingly consequential interactions with online technologies such as online recommender systems, social media, user-friendly design, microtargeting, default settings, gamification, and real-time profiling. The authors in this volume address four broad and interconnected themes: What is the conceptual nature of online manipulation? And how, methodologically, should the concept be defined? Does online manipulation threaten autonomy, freedom, and meaning in life, and if so, how? What are the epistemic, affective, and political harms and risks associated with online manipulation? What are legal and regulatory perspectives on online manipulation? This volume brings these various considerations together to offer philosophically robust answers to critical questions concerning our online interactions with one another and with autonomous systems. The Philosophy of Online Manipulation will be of interest to researchers and advanced students working in moral philosophy, digital ethics, the philosophy of technology, and the ethics of manipulation.

London; New York: Routledge, 2022. 425p.

The Fragility of Freedom: Online Holocaust Denial and Distortion

By Alina Bricman, Guenther Jikeli, Ada Baumkotter, Linus Kebba Pook, Grischa Stanjek, Karolina Placzynta, Yfat Barak-Cheney, Hannah Maman

Reflecting on the months since the recent October 7 attack, rarely has the theme of Holocaust Memorial Day 2024, ‘The Fragility of Freedom’, felt so poignant. Communities globally experienced the shattering of presumed security, and antisemitic incidents responsively spiked. Antisemitism rose across both mainstream and fringe social media platforms, and communities resultantly reported a rise in insecurity and fear. CCOA constituent countries have recorded significant rises in antisemitic incidents, including an immediate 240% increase in Germany, a three-fold rise in France, and a marked increase in Italy. The antisemitism landscape, including Holocaust denial and distortion, had shifted so drastically since October 7 that previous assumptions and understands now demand re-examination. In the run up to Holocaust Memorial Day 2024, this research compilation by members of the Coalition to Counter Online Antisemitism offers a vital contemporary examination of the current and emergent issues facing Holocaust denial and distortion online. As unique forms of antisemitism, denial and distortion are a tool of historical revisionism which specifically targets Jews, eroding Jewish experience and threatening democracy. Across different geographies and knowledge fields, this compilation unites experts around the central and sustained proliferation of Holocaust denial and distortion on social media.

Amman | Berlin | London | Paris | Washington DC: Institute for Strategic Dialogue,  2024. 34p.

Crime and Problem Gambling: A Research Landscape The Report of The Commission on Crime and Problem Gambling

By Sarah Ramanauskas  

This report reviews the relationship between crime and problem gambling. It was carried out using thematic searches and existing systematic reviews and is predominantly based on academic literature, drawing on grey literature where relevant. Despite the vast number of people who gamble regularly in the jurisdictions covered by this literature review, and the millions affected directly or indirectly by gambling addiction, there appear to be fewer than 50 peer-reviewed papers in the last 25 years which specifically address the links between the problem gambling and crime (see, for example, Calado and Griffiths, 2016). Whilst the overall quantity of research is not huge, there is consistency in findings across all jurisdictions. A number of terms are used throughout this document to describe the issue of problem gambling. ‘Problem gambling’ is the most commonly used term to describe individuals who are unable to control their gambling behaviour which in turn disrupts personal, family, financial and employment relations. The term ‘pathological gambling’ is used to indicate where this behaviour is extreme and requires significant treatment interventions. Both problem and pathological gamblers are seen as suffering from a behavioural addiction to gambling, as defined by the American Psychiatric Association. The following summary outlines the key findings of this body of work: • There is a clear relationship between disordered gambling and crime, with high prevalence rates of crimes being committed by people to fund their gambling (Williams et al, 2005) • A wide variety of crimes are committed as a result of gambling addiction; not just ‘white collar’ crimes such as theft and fraud, but also crimes that occur in public spaces such as street robbery. There is significant evidence of domestic abuse and child neglect linked to problems and pathological gambling (Breen et al, 2013; Cuadrado and Lieberman, 2011) • There is a complex interplay of causes of crime linked with the causes of disordered gambling. Cross-addictions, mental disorders, impulse control disorders and difficult life events all may play an additional role in the causation of crime – and inhibit treatment (See for example: Lahn, 2005; Sundqvist and Rosendahl, 2019; Templer et al, 1993; Turner et al 2007) • Certain demographics are more likely to commit crimes, in addition to having increased vulnerability to gambling addiction (Perrone et al, 2013; Turner et al, 2017)  • The more complex, prolonged and persistent the gambling problem, the more likely that a crime will be committed and, indeed, that many crimes may result (Turner et al, 2009; Perrone et al, 2013) • There has been a growing understanding that gambling addiction is a behavioural disorder, however, little of this has been translated to sentencing; problem gambling is not considered to be a mitigating factor in sentencing in the way mental health problems or drug and alcohol addiction are (Folino and Abait, 2009) • Whilst not always imprisoned as a direct result of problem gambling, there are extremely high rates of gambling addiction amongst prisoners. The research suggests that prisons only offer limited treatment in any of the jurisdictions covered. Research suggests that the rate of problem gambling is higher among male and female prisoners in prison, compared to the general population. Problem gambling is markedly higher amongst women than in the general population (as reported in Finnish research by Lind and Kääriäinen, 2018 and Australian research by Perrone et al, 2013) • Research suggests that there is little treatment and support for problem gamblers in prison, however, there is evidence of resistance to undertaking treatment amongst prisoners (Lahn, 2005; Turner et al, 2017) • There is some evidence that treatment for gambling addiction may significantly reduce recidivism; however, this finding is caveated by the fact there is a paucity of treatment for prisoners and those on probation • Several of the studies reviewed agreed that custodial sentences, especially when no treatment is available for gambling addiction, was not a cost-effective way of avoiding further harm to the individual or society once the sentence is completed. (see for example Ledgerwood et al, 2007) • A small number of specialised gambling courts have been established in the USA, with the aim of ensuring that gambling addicts who have committed crimes receive appropriate treatment, however, there is limited data on the success or otherwise of these initiatives (Turner et al, 2017) • There needs to be research into the potential effect of gambling addiction treatment on the rate of recidivism, as well as more general research on how best to help vulnerable populations avoid the criminal justice system.  

London: Howard League for Penal Reform’s Commission on Crime and Problem Gambling. 2020. 44p.

Monitoring Online Illegal Wildlife Trade. Insights From Brazil and South Africa 

By Global Initiative Against Transnational Organized Crime 

The last decade and a half has seen an alarming surge in illegal wildlife trade (IWT) on the internet. However, a dearth of data regarding the scale of the market, its dynamics, operations and ramifications, especially on a global scale, is a significant hindrance to combating this crime. To address this, ECO-SOLVE is developing a Global Monitoring System (GMS) to systematically monitor global online IWT and gather data to feed into law enforcement activity and to inform policymaking. The GMS is a network of data hubs in countries whose domestic online markets are considered the largest or most consequential in their regions. The GMS’s national monitoring nodes are being set up in a staggered process and the size and scope of the network will grow with each edition of the Report. This Global Trend Report draws on data from two national data hubs: Brazil and South Africa. By identifying areas of high pressure on endangered species and ecosystems, monitoring may enable targeted interventions and inform law enforcement action to prosecute those responsible for wildlife crimes. Additionally, monitoring can help detect emerging trends and shifts in the trade, allowing for timely and effective responses to new threats and challenges. This is the second publication in a series of Global Trend Reports that aim to showcase and contextualize trends in online IWT. Reports will be published throughout the three years of the ECO-SOLVE project, with about two to four reports released per year. Drawing on findings generated by the GMS, each Global Trend Report will highlight the latest trends in statistical data, including the number of advertisements found, the species advertised as well as the platforms that host these adverts. Diving deeper into individual topics, the reports will offer regional breakdowns and include sections that contextualize and analyze findings, while also investigating changes in regulations and their effects on online IWT as well as trends in law enforcement. The reports will also discuss case studies of online IWT. Following the structure of the first Global Trend Report, the second issue begins with a trend analysis of online IWT drawing on data from regular monitoring carried out between May and July 2024 by GMS data hubs in Brazil and South Africa. The report then takes a closer look at the online and offline illegal trade in Pirarucu in Brazil, as well as the trade routes used and links to cocaine markets. The third section presents a case study of the illegal wildlife trade as linked to traditional medicines in South Africa, highlighting gaps around regulations and enforcement.   

Geneva:  Global Initiative Against Transnational Organized Crime, 2024. 33p.

The recruitment of young perpetrators for criminal networks 

By Europol

This intelligence notification is based on information contributed to Europol by national law enforcement authorities. This document aims to raise awareness of the ways criminal networks exploit minors, particularly through recruitment and tasking via social media. It highlights the use of targeted language, coded messaging, and "gamification" strategies in this process. The recruitment of minors into serious and organised crime and terrorism is not a new phenomenon; however, it has increasingly become a tactic used by criminal networks to avoid detection, capture, and prosecution. In recent years, this trend has expanded across more countries, with recruitment methods evolving and minors being tasked with violent acts such as extortion and killings  

Paris: Europol: 2024. 3p.

Understanding Toxic Panda: The New Cyber Threat Targeting Data Security

By Asmita Mallick and Prithwish Ganguli

Toxic Panda is a sophisticated Android banking trojan that targets users in Europe, Latin America, and Southeast Asia. Using advanced techniques like account takeover (ATO) and on-device fraud (ODF), it bypasses security mechanisms, including multi-factor authentication, to steal sensitive data and conduct unauthorized transactions. The malware's ability to manipulate user inputs and intercept one-time passwords makes it a significant threat. This paper explores the implications of ToxicPanda, highlights the evolving landscape of cybercrime, and offers insights into preventive measures and legal frameworks to combat emerging threats.

Unpublished paper, 2024.

Evidence on Pornography’s Influence on Harmful Sexual Behavior Among Children

By The Children’s Commissioner for England

This is the second in a series of reports investigating the impact of pornography on young people, building upon the Children’s Commissioner’s report published in January 2023, “A lot of it is actually just abuse”, which set out findings from a survey of over a thousand 16-21-year-olds and focus groups with teenagers. This series of work shows the detrimental effect that pornography is having on children and young people. It adds weight to the Children’s Commissioner’s view that no child under the age of 18 should be able to access pornography. This report aimed to discover whether references to specific acts of sexual violence commonly seen in pornography could be found in official documents relating to the investigation of children who abused other children. It is not intended to be read by children, but by researchers and policy makers interested in making children safer. It makes frequent reference to sexual harassment and sexual violence, and includes descriptions of pornographic content, language, and discussion of sexual abuse. This content may be difficult to read, however, we think it is important to understand how pornography impacts children, in order that we may better protect all children from harm. The research contained within this report synthesises data from 502 documents of two types: 379 Achieving Best Evidence (ABE) transcripts of interviews with children who have been sexually harmed and children who have sexually harmed another child, from one police force, and 123 Sexual Assault Referral Centre (SARC) documents concerning children who were sexually harmed by other children from one NHS foundation trust.   

London: Children's Commissioner for England, 2023. 58p.

Enhancing Intelligent Surveillance: A Hybrid Deep Learning Approach for Anomaly Detection, Violence Recognition, and Person Re-Identification" 

By Evany Anne Moses,  M. Brindha,  N. Sivaukumaran

In recent years, the demand for intelligent surveillance systems has grown significantly due to the increasing need for enhanced security in public and private spaces. This journal presents a comprehensive approach that integrates advanced deep learning techniques for anomaly detection, violence recognition, and person re-identification in surveillance videos. The proposed system leverages a hybrid model combining ResNet50 and 3D Convolutional Neural Networks (CNNs) to accurately detect violent activities in real time. Additionally, the system includes anomaly detection to identify unusual patterns in the video feed that may signal potential security threats. The system further incorporates YOLO for high-precision object detection, DeepSort for robust tracking, and OpenPose for pose estimation, enabling real-time monitoring and accurate identification of individuals across multiple frames. Experimental results demonstrate that the integrated system outperforms traditional methods in terms of accuracy, efficiency, and scalability, making it a powerful tool for modern surveillance applications. This work highlights the potential of combining multiple deep-learning approaches to create a more effective and reliable surveillance system capable of addressing diverse security challenges.

Unpublished paper, 2024. 34p.

Pornography Exposure and Access Among Young Australians: a Cross-Sectional Study

By  Maree Crabbe, Michael Flood,,  Kelsey Adams

This article aims to explore the extent and nature of Australian young people’s pornography exposure and access.

Methods

Cross-sectional online survey of 1,985 young Australians aged 15–20 years, nationally representative of a range of demographics.

Results

Exposure to pornography was reported by 86% of male and 69% of female participants. Most exposure occurred when participants were alone and at home, regardless of gender. Young men were more likely than young women to seek pornography out and to view it frequently, with over half (54%) of male participants reporting weekly use compared with 14% of female participants. On average, boys and young men saw pornography 3.2 years before their first partnered sexual experience, and girls and young women saw it 2.0 years before theirs.

Conclusions

It is common for young people to see pornography years before their first partnered sexual experience.

Implications for public health

Unintentional and deliberate exposure to pornography is common and frequent among young people. Public health strategies among young people are necessary to address the potential harms associated with pornography use, including gender-based violence and risky sexual practices.

Australian and New Zealand Journal of Public Health Volume 48, Issue 3, June 2024, 100135

GangstaLife: Fusing Urban Ethnography with Netnography in Gang Studies

By Marta-Marika Urbanik & Robert A. Roks

Recent research on street-involved populations has documented their online presence and has highlighted the effects of their online presentations on their lives in the real world. Given the increasing conflation between the online and offline world, contemporary urban ethnographers should pay increased attention to their participants’ online presence and interactions. However, methodological training of this sort is still in its infancy stages and has not yet evolved to guide the growing number of researchers undertaking this form of research. This article draws from our experiences using social media in our urban ethnographies with criminally involved groups, to examine the benefits, risks, and challenges of drawing on social media in urban ethnography. It is intended to serve as a foundational piece that will hopefully ignite scholarly dialogue, debate, and methodological training relating to deploying social media in urban—and specifically—gang ethnography.

Qualitative Sociology 43(6) 2020.

“Say it’s Only Fictional”: How the Far-Right is Jailbreaking AI and What Can Be Done About It  

By Bàrbara Molas and Heron Lopes

This research report illustrates how far-right users have accelerated the spread of harmful content by successfully exploiting AI tools and platforms. In doing so, it contributes to improving our understanding of the misuse of AI through new data and evidence-based insights that may inform action against the dissemination of hate culture through the latest technologies.  

  The Hague: The International Centre for Counter-Terrorism (ICCT), 2024. 27p.

Phishing Risks in a University Student Community

By Roderic Broadhurst, Katie Skinner, Nicholas Sifniotis, Bryan Matamoros-Macias and Yuguang Ipsen

In an exploratory quasi-experimental study, 138 students recruited during a university orientation week were exposed to social engineering directives in the form of fake emails, or phishing, over several months in 2017. The study assessed the risks of cybercrime for students by observing their responses. Three types of scam emails were distributed that varied in the degree of individualisation: generic, tailored, and targeted or ‘spear’. The study explored the influence of scam type, cybercrime awareness, gender, IT competence and perceived internet safety on susceptibility to email scams.Although tailored and individually crafted email scams were more likely to induce engagement than generic scams, differences were not significant. Analysis of the variables showed that international students and first year students were deceived by significantly more scams than domestic students and later year students.


Trends & issues in crime and criminal justice no. 587. Canberra: Australian Institute of Criminology. 2020. 16p.

Uncovering The Ecosystem of Intellectual Property Crime: A Focus on Enablers

By Europol 

Intellectual property (IP) crime refers to the theft, infringement and unauthorised use of intellectual property ( 1 ) such as copyrights, designs, trademarks, patents, and geographical indications of origin, and crimes related to trade secrets. Common types of IP crime include counterfeiting (the manufacture, importation, distribution, storage and sale of goods that falsely carry the trademark of a genuine brand without permission) and piracy (the unauthorised copying, use, reproduction, and distribution of materials protected by intellectual property rights). IP crime continues to pose a threat to the EU’s internal security ( 2 ). The harm produced by IP crime is more significant than it appears at first sight. Not only because of its adverse economic effects, but especially in terms of impact on consumers’ health and safety, and on the EU’s natural environment. Criminal actors operating in IP crime are very adept at exploiting opportunities and loopholes, posing challenges to right holders, law enforcement and other relevant authorities. The scale of crime remains considerable. In 2022, approximately 86 million fake items were seized in the EU, with an estimated value exceeding EUR 2 billion. The most common products seized were games ( 3 ), packaging materials, toys, cigarettes, and recorded CDs/DVDs. 60 % of the goods were detained within the EU, and 40 % at the EU’s borders ( 4 ). The illegal trade in counterfeit goods was estimated to represent 5.8% of imports to the EU( 5 ). IP crime thrives because it fulfils a worldwide demand for low-priced goods, which is satisfied by criminal actors and networks operating across continents. Despite prevention campaigns to expose the health and safety dangers of purchasing and consuming counterfeit goods, besides the severe consequences for the industries and companies targeted, counterfeiting keeps appealing to or misleading consumers. IP crime entails a complex criminal process involving multiple steps and various actors. The infringement of intellectual property rights is only the initial stage of IP crime, as the final objective of counterfeiters is to profit as much as possible from the subsequent illicit sale of the fake goods introduced into the consumers’ market. IP crime relies on a multitude of enablers that make this criminal activity particularly successful and at the same time difficult to tackle. These enabling factors can be crimes in themselves, but can also be lawful activities misused for facilitating IP crime. This report explores the ecosystem of IP crime and its interactions with developments in our society. At the core of the report is a description of the criminal process by which the various types of IP crime are committed and the steps it entails. It assesses which key catalysts in today’s EU and global society drive IP crime, making it an area of opportunity for criminal actors. It zooms in on those factors – be they criminal acts or lawful activity misused for criminal purposes – that enable IP crime. At the same time, it considers how IP crime can function as an enabler of other serious and organised crimes. Ultimately, it describes IP crime’s harmful impact on EU citizens and  This report uses operational data from investigations contributed to Europol. The EUIPO has also collected contributions by the private sector. Case examples are used throughout the report as illustrations. Where relevant, open-source intelligence has been used to corroborate analytical findings. The focus on enablers invites law enforcement authorities (LEAs), legislators, relevant stakeholders and the public to work even more closely to reduce the harm of IP crime and identify the criminals behind it. A cohesive response by all stakeholders, both within and outside the EU, is a prerequisite toward the detection and dismantling of the criminal networks involved

Luxembourg: Publications Office of the European Union , 2024. 45p.

The Real 'Bond Epidemic': Misinformation, False Narratives, and Bias in the Media

By Elaine Hennig and Benjamin Greaves

Since Harris County’s misdemeanor bond system was first declared unconstitutional by a federal district court in 2017, the county has implemented several reforms as part of the resulting settlement. Before the resolution of the lawsuit, indigent defendants were detained pretrial solely based on their inability to pay bond, while their wealthier counterparts could post bond and expect prompt release. The county corrected this wealth-based discrimination by requiring the majority of misdemeanor defendants to be released on personal recognizance (PR) bonds, which do not require an upfront cash payment. By providing defendants with a new system for bonding out of jail that does not discriminate based on income, the implemented reforms ensure that defendants are not prematurely punished with jail time— upholding the principle of a ‘presumption of innocence’ for the criminally accused, and preventing taxpayers from footing the bill for unnecessary weeks or months of incarceration. Though these changes have only been applied to misdemeanor cases, several ongoing lawsuits have set the stage for reforms that could similarly improve the felony bond system. While these two systems are legally different, the rationale for reform remains the same: protecting constitutionally guaranteed rights and preventing wealth-based discrimination. Despite the more equitable reforms to Harris County’s misdemeanor system, opponents of bond reform frequently criticize the changes. Though many opponents still claim to support the principles of reform, they regularly scapegoat bond reform for the various failures of the criminal legal system. Through the use of misinformation, propagation of false narratives, and exploitation of race-based disparities, they portray bond reform as a threat to public safety. Unfortunately, this disinformation effort is facilitated by local media outlets, who amplify the voices of opponents and disseminate the narratives they promote. This report aims to examine media coverage of bond in Harris County, and to better understand the media’s role in shaping the narrative of bond reform. It draws on a content analysis of 226 news articles run by six Houston-area television stations between January 2015 and June 2021. Stories qualified for selection if they discussed bond reform, bond debates, and/or people who allegedly committed crimes while out on bond. While bias in coverage was the primary focus of this analysis, we also reviewed 15 other key variables, such as referenced ‘experts’ and the defendant’s race or ethnicity. This analysis reveals that many local media stations disproportionately publish biased articles in their reporting on bond. The media consistently provide a platform for opponents of bond reform to represent bond release as a threat to public safety, while frequently failing to contextualize opponents’ claims or feature an alternative view. In cherry-picking and sensationalizing stories about defendants who are arrested while out on bond, media outlets construct a distorted narrative of dangerous releasees, in effect exaggerating the risks of bond reform and minimizing its positive impact. These efforts continually undermine bond reform, serving only to generate fear of people released on bond pretrial. The shift in news coverage of bond is perhaps best seen through a comparison of coverage prior to and following the implementation of Harris County’s proposed settlement in 2019. Over the 48-month period from January 1, 2015, to December 31, 2018, 42 total articles focused on bond in relation to  reform or released defendants. Of those articles, only 33 percent were found to be negatively biased. In contrast, over a shorter 30-month period from January 1, 2019, to June 30, 2021, not only did the number of bond-focused articles more than quadruple to 184, but the percentage of negatively biased articles nearly doubled to 61. Although bias in media coverage is one of the most—if not the most—alarming variables analyzed in this report, several other variables have revealed similarly concerning trends. With ongoing attacks against bond reform efforts in Texas and in Houston specifically, recognizing and correcting these trends in media coverage is critical to ensuring that Harris County residents have a more informed perspective of both misdemeanor bond reform and bond reform more generally.   

Austin: TEXAS CENTER FOR JUSTICE AND EQUITY, 2021. 34p.

Production and Distribution of Child Sexual Abuse Material by Parental Figures

By Michael Salter, WK Tim Wong, Jan Breckenridge, Sue Scott, Sharon Cooper and Noam Peleg

Child sexual abuse material (CSAM) is widely available online. Existing research indicates that the parents and parental figures of victims are notably represented in offender populations. However, there is limited research in this area. Drawing on Australian media and legal databases, this study created a database of 82 cases of CSAM production and distribution perpetrated by parents and/or parental figures from 2009 to 2019. The study found that perpetrators are most often the male parental figures of the victims, and victims are predominately girls under nine years of age. The findings reveal distinct patterns and scenarios of parental CSAM offending that may inform prevention, early intervention and improved responses to victims. The study documented the significant impact of parental CSAM offending on victims and the need for specialist victim support.

Trends & issues in crime and criminal justice no. 616.  Canberra: Australian Institute of Criminology. 2021. 17p.

Criminal mobility of outlaw motorcycle gangs in Australia

By Christopher Dowling and Anthony Morgan

The criminal mobility of outlaw motorcycle gang (OMCG) members presents a significant challenge to Australian governments and police. Examining patterns of mobility can help to better understand the opportunity structures that underpin offending by OMCGs and to drive national collaborative responses to these gangs. This study examines the prevalence and patterns of criminal mobility in a sample of almost 4,000 OMCG members in more than 400 chapters. Around one in 10 members showed evidence of criminal mobility over the long term, while more than one-third of chapters comprised criminally mobile members. Criminally mobile gang members were heavily concentrated in a small number of chapters. Patterns of criminal mobility primarily involve movements into east coast jurisdictions. New South Wales and Queensland emerged as the most common destinations for criminally mobile OMCG members  

Trends & issues in crime and criminal justice no. 619. Canberra: Australian Institute of Criminology. 2021. 16p