Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged Investigations
The curious case of vandals: Brazil’s environmental and regional policies in the Bolsonaro years

By Monika Sawicka


This paper aims to contribute to the debate on foreign policy strategies of state actors in the international system with a particular focus onpolicies pursued by far-right populist leaders. On the theoretical level,it builds on role theory and status-seeking strategies drawn from social identity theory (SIT) to offer an enhanced conceptual framework suit-able for scrutinising more radical forms of international activism. Thetheoretical points are then illustrated empirically by exposing the find-ings from content analysis of Brazilian policymakers’ speeches and their juxtaposition with the Bolsonaro government’s policies in the areas of environmental protection and regional cooperation. The author’s main claim is that President Jair Bolsonaro and his Foreign Affairs MinisterErnesto Araújo, through their rhetoric about cooperation in SouthAmerica and the Amazon and the actions undertaken by the adminis-tration in these fields, envisioned for Brazil the role of vandal. This had substantial consequences for the country’s international standing.

GEOPOLITICS, 2023, VOL. 28, NO. 2, 619–640

Come at the king, you best not miss: criminal network adaptation after law enforcement targeting of key players

By Giulia Berlusconi

This paper investigates the impact of the targeting of key players by law enforcement on the structure, communication strategies, and activities of a drug trafficking network. Data are extracted from judicial court documents. The unique nature of the investigation – which saw a key player being arrested mid-investigation but police monitoring continuing for another year – allows to compare the network before and after targeting. This paper combines a quantitative element where network statistics and exponential random graph models are used to describe and explain structural changes over time, and a qualitative element where the content of wiretapped conversations is analysed. After law enforcement targeting, network members favoured security over efficiency, although criminal collaboration continued after the arrest of the key player. This paper contributes to the growing literature on the efficiency-security trade-off in criminal networks, and discusses policy implications for repressive policies in illegal drug markets.

Global Crime, Volume 23, 2022 - Issue 1

Benefits and Risks of Implementing Cloud-Based Technology for Child Sexual Abuse Investigations in Australia

By Bryce Westlake, Russell Brewer, Kellie Toole, Tom Daly, Thomas Swearingen, Scott Fletcher, Franco Ucci and Katie Logos

Transitioning to cloud-based infrastructure (CBI) for processing child sexual abuse material (CSAM) collected during police investigations could address resource challenges agencies currently face. While CBI provides quantifiable scalability and budgetary and interagency collaborative advantages, potential risks associated with data security, data sovereignty, and various legal and regulatory concerns may make agencies hesitant to make this transition. However, this paper demonstrates how a ‘shared responsibility model’ approach to cloud security can minimize risks, allowing investigators to take advantage of CBI benefits. In partnership with Oracle Corporation, we demonstrate how this could be implemented and continually monitored for new vulnerabilities within a CSAM context over time.   

Trends & issues in crime and criminal justice no. 699. Canberra: Australian Institute of Criminology. 2024.