Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged Distribution
Using Intelligence Analysis to Understand and Address Fentanyl Distribution Networks in America’s Largest Port City 

By Aili Malm, Nicholas Perez, Michael D. White

This publication represents the final research report of California State University, Long Beach’s (CSULB) evaluation of an intelligence-led problem-oriented policing (POP) project to better understand and address illicit fentanyl distribution networks in Long Beach, CA. The goals of this study were to: (1) employ problem-oriented policing to drive efforts to identify and disrupt fentanyl distribution networks in Long Beach, CA, and (2) use intelligence analysis to identify high-level distributors for investigation. To achieve these goals, researchers worked with a newly hired intelligence analyst and Long Beach Police Department (LBPD) Drug Investigation Section (DIS) detectives to improve their fentanyl distribution network investigations. The intervention included POP training, intelligence analyst support [cellular phone extractions, open-source intelligence (OSINT), social network analysis (SNA), etc.], and weekly interactions between the analyst and the research team. To assess the effectiveness of the project, we conducted both process and outcome evaluations. Primary data sources include: (1) interviews of detectives and the analyst; (2) DIS administrative data; (3) network data from three fentanyl distribution cases; and (4) fentanyl-related overdose data from the LBPD and the California Overdose Surveillance Dashboard. We identified findings across multiple analyses that, when taken together, represent a persuasive collection of circumstantial evidence regarding the positive effects of the project on two important outcomes: increased DIS activity and efficiency and effective fentanyl distribution network disruption. While fentanyl-related overdose rates did decrease substantially over the course of the project, there is no conclusive evidence that the project led to the reduction. The effects of COVID-19, the defund movement following George Floyd’s death, and the Los Angeles County District Attorney policy limiting the prosecution of drug offenses confounded our ability to draw a stronger connection between the project and enhanced DIS activity and efficiency, fentanyl distribution network disruption, and overdose rates.   

California State University, Long Beach; School of Criminology, Criminal Justice, and Emergency Management; 2024 77p. 

Uncovering The Ecosystem of Intellectual Property Crime: A Focus on Enablers

By Europol 

Intellectual property (IP) crime refers to the theft, infringement and unauthorised use of intellectual property ( 1 ) such as copyrights, designs, trademarks, patents, and geographical indications of origin, and crimes related to trade secrets. Common types of IP crime include counterfeiting (the manufacture, importation, distribution, storage and sale of goods that falsely carry the trademark of a genuine brand without permission) and piracy (the unauthorised copying, use, reproduction, and distribution of materials protected by intellectual property rights). IP crime continues to pose a threat to the EU’s internal security ( 2 ). The harm produced by IP crime is more significant than it appears at first sight. Not only because of its adverse economic effects, but especially in terms of impact on consumers’ health and safety, and on the EU’s natural environment. Criminal actors operating in IP crime are very adept at exploiting opportunities and loopholes, posing challenges to right holders, law enforcement and other relevant authorities. The scale of crime remains considerable. In 2022, approximately 86 million fake items were seized in the EU, with an estimated value exceeding EUR 2 billion. The most common products seized were games ( 3 ), packaging materials, toys, cigarettes, and recorded CDs/DVDs. 60 % of the goods were detained within the EU, and 40 % at the EU’s borders ( 4 ). The illegal trade in counterfeit goods was estimated to represent 5.8% of imports to the EU( 5 ). IP crime thrives because it fulfils a worldwide demand for low-priced goods, which is satisfied by criminal actors and networks operating across continents. Despite prevention campaigns to expose the health and safety dangers of purchasing and consuming counterfeit goods, besides the severe consequences for the industries and companies targeted, counterfeiting keeps appealing to or misleading consumers. IP crime entails a complex criminal process involving multiple steps and various actors. The infringement of intellectual property rights is only the initial stage of IP crime, as the final objective of counterfeiters is to profit as much as possible from the subsequent illicit sale of the fake goods introduced into the consumers’ market. IP crime relies on a multitude of enablers that make this criminal activity particularly successful and at the same time difficult to tackle. These enabling factors can be crimes in themselves, but can also be lawful activities misused for facilitating IP crime. This report explores the ecosystem of IP crime and its interactions with developments in our society. At the core of the report is a description of the criminal process by which the various types of IP crime are committed and the steps it entails. It assesses which key catalysts in today’s EU and global society drive IP crime, making it an area of opportunity for criminal actors. It zooms in on those factors – be they criminal acts or lawful activity misused for criminal purposes – that enable IP crime. At the same time, it considers how IP crime can function as an enabler of other serious and organised crimes. Ultimately, it describes IP crime’s harmful impact on EU citizens and  This report uses operational data from investigations contributed to Europol. The EUIPO has also collected contributions by the private sector. Case examples are used throughout the report as illustrations. Where relevant, open-source intelligence has been used to corroborate analytical findings. The focus on enablers invites law enforcement authorities (LEAs), legislators, relevant stakeholders and the public to work even more closely to reduce the harm of IP crime and identify the criminals behind it. A cohesive response by all stakeholders, both within and outside the EU, is a prerequisite toward the detection and dismantling of the criminal networks involved

Luxembourg: Publications Office of the European Union , 2024. 45p.

Production and Distribution of Child Sexual Abuse Material by Parental Figures

By Michael Salter, WK Tim Wong, Jan Breckenridge, Sue Scott, Sharon Cooper and Noam Peleg

Child sexual abuse material (CSAM) is widely available online. Existing research indicates that the parents and parental figures of victims are notably represented in offender populations. However, there is limited research in this area. Drawing on Australian media and legal databases, this study created a database of 82 cases of CSAM production and distribution perpetrated by parents and/or parental figures from 2009 to 2019. The study found that perpetrators are most often the male parental figures of the victims, and victims are predominately girls under nine years of age. The findings reveal distinct patterns and scenarios of parental CSAM offending that may inform prevention, early intervention and improved responses to victims. The study documented the significant impact of parental CSAM offending on victims and the need for specialist victim support.

Trends & issues in crime and criminal justice no. 616.  Canberra: Australian Institute of Criminology. 2021. 17p.

Crime Commission Processes in Child Sexual Abuse Material Production and Distribution: A Systematic Review

By Jesse Cale, Thomas Holt, Benoit Leclerc, Sara Singh and Jacqueline Drew

This review synthesises empirical studies from the past decade investigating child sexual abuse material (CSAM) production and distribution to gain insight into crime commission processes involved in these crimes. The findings highlight overlaps in risk factors for child sexual abuse and CSAM production and distribution, and possible unique risk factors specific to the latter. A substantial amount of CSAM is produced in family contexts, and there are different motivations and strategies for producing CSAM. Taken together, the findings provide important foundational information about the variety of crime commission processes involved in CSAM production and distribution, helping the development of effective prevention and intervention strategies for this increasingly prolific type of crime.

Trends & issues in crime and criminal justice no. 617. Canberra: Australian Institute of Criminology. 2021. 22p.