Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in social science
Transforming Pain into Rights Risks, Threats and Attacks on Women Searchers in Colombia

By Amnesty International

Enforced disappearance is both a crime under international law and a serious human rights violation. When a person is deprived of their liberty and their fate or whereabouts concealed, the lives of their families, loved ones and communities are put on hold while they wait to learn of what has happened to them and where they are. In Colombia, as in other countries in the Americas, many of the people left waiting or searching for their loved ones after an enforced disappearance have turned uncertainty into a force for change. Firstly, to find the victims of enforced disappearance. Second, to demand truth, justice, reparation and guarantees of non-recurrence. Third, to continue the struggle to ascertain the fate and whereabouts of other people’s loved ones and to defend human rights. Women play a leading role in this story. They are the ones who have overwhelmingly taken on the task of searching for the victims of enforced disappearance in Colombia. In doing so, not only have they raised their voices against the injustice of the enforced disappearance imposed on them, but they have also acted as searchers and human rights defenders. In Colombia, taking on these roles means exposing themselves to unacceptable risks, threats and attacks. Whether they are searching for a loved one, helping someone else to search for a loved one, or defending the rights of victims of enforced disappearance and their families, women who search face arbitrariness, impunity and violence, sometimes from the state and sometimes from non-state actors, especially state security forces and armed opposition groups. In most cases, this violence is gendered. The nature of the risks, threats and attacks that women searchers face often intersect with their gender. Among other forms of violence against women, threats relate to their bodies or to their assigned or assumed gender roles, and perpetrators disproportionately use sexual violence against women. However, women searchers not only continue their work, but also put forward proposals for action to ensure that the state respects, guarantees and protects their rights. The most recent manifestation of this driving force is the approval of Law 2364 of 2024, a proposal that emerged from a group of organizations and communities of women searchers who spoke of their own life experiences, analysed them and used them to draft a bill designed to urge the state to take appropriate measures to end this scourge. With this report, Amnesty International begins a process of documenting the situation of risks, threats and attacks faced by women searchers in Colombia and, based on this, a process of monitoring the implementation of Law 2364 of 2024, which will continue over the next few years. This first part documents the story of Yanette Bautista, Andrea Torres and the Nydia Erika Bautista Foundation (FNEB), an organization of women searchers and victims of enforced disappearance that accompanies other organizations and communities in their own cases.

London: Amnesty International, 2024. 64p.

What do Children and Young People Think about the Police?

By Cassandra Popham, Ellie Taylor and William Teager., et al.

The Youth Endowment Fund surveyed over 10,000 teenage children (aged 13-17) in England and Wales about their experiences of violence. The findings are detailed across five reports, each focusing on a different aspect. In this report, we look at teenage children’s views and experiences of the police. Here’s what we found. Opinions of the police differ according to children’s experiences. Teenagers’ views of the police shift as they get older and gain more exposure to policing. Over half (54%) of 13-17-year-olds believe the police do a good job in their local areas. Similar proportions feel the police use force appropriately (50%) and are available when needed (47%). Only 45% think the police treat everyone fairly, regardless of race or religion.

Age plays a significant role in shaping perceptions. Thirteen-year-olds consistently express the most positive views, while 16-17-year-olds are more critical of police conduct. Interestingly, Black teenagers (63%) are the most likely to agree that the police do a good job locally, compared to 54% of White children, 52% of Asian children and 50% of mixed ethnicity children. However, Black (39%) and mixed ethnicity (36%) children are far less likely to believe the police treat everyone fairly than White children (47%). When it comes to the use of force, Asian (47%), Black (42%) and mixed ethnicity (39%) children are also less likely to agree that police use force only when necessary when compared to White children (52%).

Children with direct experiences of violence tend to have more positive views of the police. For instance, 62% of children who’ve been victims of serious violence think their local police do a good job, compared to 54% of children who haven’t been a victim. Direct experiences with the police also affect perceptions, but the effect differs depending on racial background. White teenagers who’ve had contact with the police are more likely to say the police do a good job than those with no direct experience. But this is not the case for teenagers from Black, Asian and mixed ethnic backgrounds.

Children are mostly supportive of stop and search but don’t all agree it’s used fairly. Most teenagers are supportive of the police’s power to stop and search, though not all believe it’s applied fairly. Overall, 68% of 13-17-year-olds support stop and search, and 72% believe it helps prevent knife crime. However, only 56% think that stop and search is used fairly. Younger teenagers (aged 13-15) are generally more supportive of stop and search than older teenagers (aged 16-17). Racial differences also emerge, with White children more likely to view stop and search as both effective and fair than their Black, Asian and mixed ethnicity peers.

London: Youth Endowment Fund, Children, violence and vulnerability 2024 Report 4. 33p.

Cyberviolence Against Women in the EU

By Ionel Zamfir and Colin Murphy

The rise of digital technologies represents a double-edged sword for women's rights. On the one hand, the digital environment has enabled women to build networks and spread awareness about the abuse they suffer, such as through the #Metoo movement. On the other, it has provided abusers and misogynists with new tools with which they can spread their harmful content on an unprecedented scale. With the development of artificial intelligence, these trends, both positive and negative, are expected to continue. Against this backdrop, it has become clear that digital violence is as harmful as offline violence and needs to be tackled with the full force of the law, as well as through other non-legislative measures. Moreover, the digital content causing the harm – images, messages, etc. – needs to be erased. This is particularly important, as the impact on victims is profound and long-lasting. The European Union has adopted several pieces of legislation that aim to make a difference in this respect. The directive on combating violence against women, to be implemented at the latest by June 2027, sets minimum EU standards for criminalising several serious forms of cyberviolence and enhances the protection of and access to justice for victims. EU legislation on the protection of privacy is also having an impact on cyberviolence. For example, the new Digital Services Act imposes an obligation on big digital platforms in the EU to remove harmful content from their websites. This is instrumental in removing intimate or manipulated images that are disseminated on the internet without the person's consent; almost all such images portray women, according to existing data. Member States use a multiplicity of legal approaches to tackle this issue, combining criminalisation of specific cyber offences with the use of general criminal law. In some Member States, an explicit gender dimension is also included.

Brussels: EPRS | European Parliamentary Research Service, 2024. 11p

Understanding Adult Sexual Assault Matters: Insights from Research and Practice: An Educational Resource for the Justice Sector

By Nina Hudson, Rachel Moody, Heather McKay, Rae Kaspiew

The guide presents research-based insights that challenge common stereotypes, highlighting the diverse experiences of victims and survivors and offering practical examples and approaches for professionals to implement in their practice. It is intended for use by professionals within the Australian justice sector, specifically police, lawyers, and judicial officers.

This resource aims to support a more trauma-informed, victim-centred approach within the Australian justice system, ultimately fostering a greater understanding of the complexities of sexual assault. It was developed in response to calls for improvements in the justice system's handling of sexual assault cases and draws on research from over 100 Australian and international sources.

Australian Institute of Family Studies, 2024. 83p.

Through the Chat Window and Into the Real World: Preparing for AI Agents

By: Helen Toner, John Bansemer, Kyle Crichton, Matthew Burtell, Thomas Woodside, Anat Lior, Andrew Lohn, Ashwin Acharya, Beba Cibralic, Chris Painter, Cullen O’Keefe, Iason Gabriel, Kathleen Fisher, Ketan Ramakrishnan, Krystal Jackson, Noam Kolt, Rebecca Crootof, and Samrat Chatterjee

The concept of artificial intelligence systems that actively pursue goals—known as AI “agents”—is not new. But over the last year or two, progress in large language models (LLMs) has sparked a wave of excitement among AI developers about the possibility of creating sophisticated, general-purpose AI agents in the near future. Startups and major technology companies have announced their intent to build and sell AI agents that can act as personal assistants, virtual employees, software engineers, and more. While current systems remain somewhat rudimentary, they are improving quickly. Widespread deployment of highly capable AI agents could have transformative effects on society and the economy. This workshop report describes findings from a recent CSET-led workshop on the policy implications of increasingly “agentic” AI systems.

In the absence of a consensus definition of an “agent,” we describe four characteristics of increasingly agentic AI systems: they pursue more complex goals in more complex environments, exhibiting independent planning and adaptation to directly take actions in virtual or real-world environments. These characteristics help to establish how, for example, a cyber-offense agent that could autonomously carry out a cyber intrusion would be more agentic than a chatbot advising a human hacker. A “CEO-AI” that could run a company without human intervention would likewise be more agentic than an AI acting as a personal assistant.

At present, general-purpose LLM-based agents are the subject of significant interest among AI developers and investors. These agents consist of an advanced LLM (or multimodal model) that uses “scaffolding” software to interface with external environments and tools such as a browser or code interpreter. Proof-of-concept products that can, for example, write code, order food deliveries, and help manage customer relationships are already on the market, and many relevant players believe that the coming years will see rapid progress.

In addition to the many potential benefits that AI agents will likely bring, they may also exacerbate a range of existing AI-related issues and even create new challenges. The ability of agents to pursue complex goals without human intervention could lead to more serious accidents; facilitate misuse by scammers, cybercriminals, and others; and create new challenges in allocating responsibility when harms materialize. Existing data governance and privacy issues may be heightened by developers’ interest in using data to create agents that can be tailored to a specific user or context. If highly capable agents reach widespread use, users may become vulnerable to skill fade and dependency, agents may collude with one another in undesirable ways, and significant labor impacts could materialize as an increasing range of currently human-performed tasks become automated.

To manage these challenges, our workshop participants discussed three categories of interventions:

  • Measurement and evaluation: At present, our ability to assess the capabilities and real-world impacts of AI agents is very limited. Developing better methodologies to track improvements in the capabilities of AI agents themselves, and to collect ecological data about their impacts on the world, would make it more feasible to anticipate and adapt to future progress.

  • Technical guardrails: Governance objectives such as visibility, control, trustworthiness, as well as security and privacy can be supported by the thoughtful design of AI agents and the technical ecosystems around them. However, there may be trade-offs between different objectives. For example, many mechanisms that would promote visibility into and control over the operations of AI agents may be in tension with design choices that would prioritize privacy and security.

  • Legal guardrails: Many existing areas of law—including agency law, corporate law, contract law, criminal law, tort law, property law, and insurance law—will play a role in how the impacts of AI agents are managed. Areas where contention may arise when attempting to apply existing legal doctrines include questions about the “state of mind” of AI agents, the legal personhood of AI agents, how industry standards could be used to evaluate negligence, and how existing principal-agent frameworks should apply in situations involving AI agents.

While it is far from clear how AI agents will develop, the level of interest and investment in this technology from AI developers means that policymakers should understand the potential implications and intervention points. For now, valuable steps could include improving measurement and evaluation of AI agents’ capabilities and impacts, deeper consideration of how technical guardrails can support multiple governance objectives, and analysis of how existing legal doctrines may need to be adjusted or updated to handle more sophisticated AI agents.

Center for Security and Emerging Technology, October 2024

Bytes and Battles: Inclusion of Data Governance in Responsible Military AI

By: Yasmin Afina and Sarah Grand-Clément

Data plays a critical role in the training, testing and use of artificial intelligence (AI), including in the military domain. Research and development for AI-enabled military solutions is proceeding at breakneck speed, and the important role data plays in shaping these technologies has implications and, at times, raises concerns. These issues are increasingly subject to scrutiny and range from difficulty in finding or creating training and testing data relevant to the military domain, to (harmful) biases in training data sets, as well as their susceptibility to cyberattacks and interference (for example, data poisoning). Yet pathways and governance solutions to address these issues remain scarce and very much underexplored.

This paper aims to fill this gap by first providing a comprehensive overview on data issues surrounding the development, deployment and use of AI. It then explores data governance practices from civilian applications to identify lessons for military applications, as well as highlight any limitations to such an approach. The paper concludes with an overview of possible policy and governance approaches to data practices surrounding military AI to foster the responsible development, testing, deployment and use of AI in the military domain.

CIGI Papers No. 308 — October 2024

THE IMPLICATIONS OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: SHIFTING THE OFFENSE- DEFENSE BALANCE

By: Jennifer Tang, Tiffany Saade, and Steve Kelly

Cutting-edge advances in artificial intelligence (AI) are taking the world by storm, driven by a massive surge of investment, countless new start-ups, and regular technological breakthroughs. AI presents key opportunities within cybersecurity, but concerns remain regarding the ways malicious actors might also use the technology. In this study, the Institute for Security and Technology (IST) seeks to paint a comprehensive picture of the state of play— cutting through vagaries and product marketing hype, providing our outlook for the near future, and most importantly, suggesting ways in which the case for optimism can be realized.

The report concludes that in the near term, AI offers a significant advantage to cyber defenders, particularly those who can capitalize on their "home field" advantage and firstmover status. However, sophisticated threat actors are also leveraging AI to enhance their capabilities, making continued investment and innovation in AI-enabled cyber defense crucial. At this time of writing, AI is not yet unlocking novel capabilities or outcomes, but instead represents a significant leap in speed, scale, and completeness.

This work is the foundation of a broader IST project to better understand which areas of cybersecurity require the greatest collective focus and alignment—for example, greater opportunities for accelerating threat intelligence collection and response, democratized tools for automating defenses, and/or developing the means for scaling security across disparate platforms—and to design a set of actionable technical and policy recommendations in pursuit of a secure, sustainable digital ecosystem.

The Institute for Security and Technology, October 2024

The Global Flow of Information: Legal, Social, and Cultural Perspectives

By Ramesh Subramanian, Eddan Katz

The Internet has been integral to the globalization of a range of goods and production, from intellectual property and scientific research to political discourse and cultural symbols. Yet the ease with which it allows information to flow at a global level presents enormous regulatory challenges. Understanding if, when, and how the law should regulate online, international flows of information requires a firm grasp of past, present, and future patterns of information flow, and their political, economic, social, and cultural consequences.

In The Global Flow of Information, specialists from law, economics, public policy, international studies, and other disciplines probe the issues that lie at the intersection of globalization, law, and technology, and pay particular attention to the wider contextual question of Internet regulation in a globalized world. While individual essays examine everything from the pharmaceutical industry to television to “information warfare” against suspected enemies of the state, all contributors address the fundamental question of whether or not the flow of information across national borders can be controlled, and what role the law should play in regulating global information flows.

New York: NYU Press, 2011.

It’s everyone’s problem: mainstreaming responses to technology-facilitated gender-based violence

By Nina JankowiczIsabella Gomez-O’Keefe, Lauren Hoffman and Andrea Vidal Becker

Technology facilitated gender-based violence (TFGBV) is not an in­tractable problem. But it must no longer be the responsibility solely of women’s advocacy groups. Others – technology companies, governments, civil society organizations, law enforcement, businesses, schools – must step up and work in unison to combat TFGBV in order to to reflect its main­streamed effects on society. This report, drawing on a case study around the online harassment of Australian eSafety Commissioner Julie Inman Grant, assesses the state of research on TFGBV as well as recent global policy progress made on this issue, and offers a number of practical solutions to make women and girls safer online. The authors argue that TFGBV must be mainstreamed to be mitigated, centering women’s experiences in broader policy debates. Technology companies, governments, civic tech organizations, law enforcement, employers, schools, and others must mainstream their work to combat TFGBV to reflect its mainstreamed effects on society. To this end, the authors recommend a number of practical solutions to the specific and pressing issues that women and girls face online today. Addressing the urgent changes described here will not only make women and girls safer and ensure their voices are heard, but also improve the safety and free expression for everyone who uses the internet, building more robust, representative democracies.

The recommendations are presented under the following themes:

  • Ensuring platform accountability and action

  • Urgently addressing deepfake image-based sexual abuse

  • Supporting victims and survivors of TFGBV

  • Deepening research and mainstreaming advocacy.

New York: Columbia University, Institute of Global Politics, 2024. 41p.

Does Weather Make People Kill Each Other: Correlation Between Weather Variables and Crime in Multiple Cities

By Jai Gupta

This article aims to explore the relationship between weather and crime by answering the question: To what extent does the weather in cities with varying year-round temperatures have different relationships with both property and violent crime? The current literature has found a significant correlation between the increase in outside temperature with the increase in crime. However, this relationship has not been compared between warm and cold cities with relatively similar city variables, such as demographics, poverty rates, and others. The researcher performed a quantitative, correlational, ex post facto study to address this gap in the literature. The researcher examined three weather variables: average average temperature, average high temperature, and average low temperature across six cities. These six cities were split into three pairs, each pair having a warm and cold city. The researcher found four principle findings: cities with colder year-round temperatures had a more significant correlation between weather and crime; of the weather variables examined, the average low temperature had the strongest relationship with crimes across all cities; between violent and property crime, property crime had a stronger correlation with all weather variables on average; and lastly, as temperature increases across all weather variables, crime, on average, also increased. While more research should be conducted, these findings hope to serve local policy makers and law enforcement on better predicting crime.

Unpublished paper,  (April 30, 2024).

The impact of childhood sexual abuse on interpersonal violence in men: A systematic review

By  Aika Hui , Paul Salkovskis, Joshua Rumble-Browne

The current systematic review aimed to critically examine the growing body of literature proposing that there is an ‘intergenerational cycle’ of violence, whereby victims of abuse during childhood are posited to have a higher propensity of becoming perpetrators during adulthood. Specifically, this review examined whether there is quality evidence supporting the relationship between childhood sexual abuse victimisation and interpersonal violence perpetration (sexual/physical) in adult men. 20 studies published between 1992 and 2022 were included in this review. The quality of studies was systematically assessed to provide a weighted conclusion to the primary research question. Overall, there was limited evidence to confidently support or reject the link between childhood sexual abuse and physical and/or sexual violence in adulthood for men. The current review found that whilst there were studies that found associations on a univariate and multivariate level between childhood sexual abuse and interpersonal violence in adult men, only 25 % of the papers included in this review were deemed high-quality and significant methodological issues limit the validity of conclusions made. Addi tionally, a sizeable proportion of high-quality studies at both univariate and multivariate levels of analysis suggest mixed results or did not find a significant relationship. Implications for future research studies in this area in terms of the encouragement of a more critical stance towards the assumption of ‘intergenerational cycles’ of violence as well as recommendations for methodological improvements of studies were discussed.  

Aggression and Violent Behavior Volume 78, September–October 2024, 101928

Crime concentrations at micro places: A review of the evidence 

By David Weisburd, Taryn Zastrow  , Kiseong Kuen  , Martin A. Andresen

Our paper reports on a systematic review of crime concentration studies over the last 35 years. We identify 47 papers that report on crime concentrations at a micro geographic unit of analysis. These papers produced 49 estimates of general crime concentration for crime incidents at streets segments for a specific cumulative proportion of crime. The median concentration for these estimates is 50 % of crime found at 4.5 % of streets, and 25 % of crime at 1.25 % of streets. The bandwidth for 50 % crime concentration is 9.3 % (1.7–11.0 %), and for 25 % crime concentration 3.0 % (0.4–3.4 %). Using the interquartile range to exclude outliers, we found a bandwidth of 2.5 % (3.2–5.7 %) for 50 % of crime, and 1.4 % (0.8–2.2 %) for 25 % of crime. Crime concentration was generally stronger for specific types of crime, and bandwidths of concentration were generally smaller. Using alternative measures of crime and different micro geographies produces similar conclusions regarding strong crime concentration at place with narrow bandwidths. Our review shows that a general framework of a law of crime concentration applies across a large number of cities across many regions around the world. 

Aggression and Violent Behavior Volume 78, September–October 2024, 101979

It's a Bird, It's a Plane, It's Superman! Using Mass Media to Fight Intolerance

By Alex Armand, Paul Atwell, Joseph Gomes, Giuseppe Musillo, Yannik Schenk

This paper investigates the role of mass media in shaping racial tolerance and advancing civil rights in the post-WWII United States. We study the first attempt in the history of mass media to use a radio broadcast targeted at children to promote an inclusive American society. In 1946, amid persistent racial divisions, the popular radio series The Adventures of Superman launched Operation Intolerance, a sequence of new episodes promoting equality, rejecting racial discrimination, and exposing the KKK's bigotry. Using digitized historical data on U.S. radio stations and state-of-the-art radio propagation models, we compute geographic exposure to the broadcasts. Exploiting exogenous exposure to the broadcasts, we employ a cohort study design to analyze individual-level data from 1964 to 1980–a crucial period for civil rights activism and legislation in the United States. We find lasting impacts on those exposed as children, including increased support for civil rights, improved interracial relations, and more progressive political attitudes. These effects translate into greater alignment with the Civil Rights Movement, evidenced by increased support for protests and diminished institutional trust, and further manifested by reduced participation in the Vietnam War. Additionally, county-level panel data illustrate how areas covered by the broadcast in 1946 evolve towards less segregationist attitudes, a lower presence of the KKK, and an increase in civil rights activism and prominence in discourse.

Bonn: Institute of Labor Economics, 2024.

Positive Online Interventions Playbook: Innovating Responses to a Shifting Online Extremist Landscape in New Zealand

By The  Institute for Strategic Dialogue

The rapidly evolving online extremist landscape in New Zealand means new strategies for intervention are needed. This playbook – developed in consultation with New Zealand’s rich tapestry of civil society, communities, and practitioners engaged in prevention – offers practical frameworks for projects promoting positive online interventions to tackle online extremism. Based on an analysis of the rapidly evolving landscape of online extremism, the playbook takes stock of established and emerging intervention models. It brings together domestic and international best practices and suggests potential avenues for new positive intervention approaches. Finally, it reflects on practical considerations for programming, including monitoring and evaluation, safeguarding, operational security, and ethical considerations. This playbook examines the shift from violent groups to online extremism, highlighting digital literacy, audience communication, and proactive engagement with at-risk individuals.

London: Institute for Strategic Dialogue, 2024. 37p.

Open Source Investigations In The Age Of Google

Edited by Henrietta WilsonOlamie Samuel, and Dan Plesch

How did a journalist find out who was responsible for bombing hospitals in Syria from his desk in New York? How can South Sudanese monitors safely track and detail the weapons in their communities and make sure that global audiences take notice? How do researchers in London coordinate worldwide work uncovering global corruption? What are policymakers, lawyers, and intelligence agencies doing to keep up with and make use of these activities? In the age of Google, threats to human security are being tracked in completely new ways. Human rights abuses, political violence, nuclear weapons, corruption, radicalization, and conflict are all being monitored, analyzed, and documented. Although open source investigations are neither easy to conduct nor straightforward to apply, with diligence and effort, societies, agencies, and individuals have the potential to use them to strengthen security. This interdisciplinary book presents 18 original chapters by prize-winning practitioners, experts, and rising stars, detailing what open source investigations are and how they are carried out, and examining the opportunities and challenges they present to global transparency, accountability, and justice. It is essential reading for current and future digital investigators, journalists, and scholars of global governance, international relations, and humanitarian law, as well as anyone interested in the possibilities and dangers of this new field.

Singapore: World Scientific Publishing Europe Ltd, 2024.