Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged Law
THE MUSLIM BROTHERHOOD’S STRATEGIC ENTRYISM INTO THE UNITED STATES: A SYSTEMIC ANALYSIS

By The Institute for the Study of Global Antisemitism and Policy (ISGAP)

This study investigates the Muslim Brotherhood’s strategy of “civilizational struggle” (jihad) in Western society, with a specific focus on the United States. By analyzing primary documents, including the “Explanatory Memorandum” (1991) and “The Project” (1982), along with comparative historical analysis, it traces the development of the Brotherhood’s doctrine of tamkeen (institutional entrenchment) from its theoretical roots in early twentieth-century Egypt to its more advanced practical application in the United States. The study identifies and thoroughly analyzes four strategic domains of influence: policy impact through government entryism and coalition-building; manipulation of the legal framework via lawfare and the redefinition of core concepts; institutional infiltration across educational and civil society organizations; and the establishment of narrative control through media influence and discourse shaping. Multiple detailed case studies within each domain show how Brotherhoodaligned groups have executed these strategies across different countries and historical periods. The analysis in this study, supported by extensive documentary evidence and organizational network assessments, demonstrates that the Muslim Brotherhood’s long-term strategy is a deliberate, multigenerational effort that closely aligns with its founders’ vision of gradually transforming Western society from within, primarily through nonviolent means. Ideologically speaking, it is also fundamentally opposed to Western democratic values and governance systems. This study offers an important assessment of the key strategic objectives of Islamist extremism and ideological entryism within democratic systems by the Muslim Brotherhood, as well as the intersection of Islamist extremism with religious identity politics that exploit democratic principles, multicultural respect for diversity, and transnational movements in an era of globalization and information warfare. The study concludes with an assessment of the challenges faced by policymakers, security professionals, and civil society leaders who aim to protect democratic values while respecting religious freedoms. In a nutshell, it states that effective responses need to balance security concerns with civil liberties, differentiate between genuine religious practice and ideological extremism, and create more sophisticated frameworks for understanding and addressing radical Islamism.

Optimized Combined-Clustering Methods for Finding Replicated Criminal Websites

By Jake M. Drew and Tyler Moore

To be successful, cybercriminals must figure out how to scale their scams. They duplicate content on new websites, often staying one step ahead of defenders that shut down past schemes. For some scams, such as phishing and counterfeit goods shops, the duplicated content remains nearly identical. In others, such as advanced-fee fraud and online Ponzi schemes, the criminal must alter content so that it appears different in order to evade detection by victims and law enforcement. Nevertheless, similarities often remain, in terms of the website structure or content, since making truly unique copies does not scale well. In this paper, we present a novel optimized combined clustering method that links together replicated scam websites, even when the criminal has taken steps to hide connections. We present automated methods to extract key website features, including rendered text, HTML structure, file structure, and screenshots. We describe a process to automatically identify the best combination of such attributes to most accurately cluster similar websites together. To demonstrate the method’s applicability to cybercrime, we evaluate its performance against two collected datasets of scam websites: fake escrow services and high-yield investment programs (HYIPs). We show that our method more accurately groups similar websites together than those existing general-purpose consensus clustering methods.

• Smugglers were the top source of information for those who obtained information prior to starting their journey (50%), even more so for women (60%).This high percentage likely stems from the unique sampling criteria, in which all respondents used a smuggler. • However, 28% of migrants overall considered smugglers to be the most reliable source of information, and less so among women (21%).

London: Mixed Migration Centre, 2025. 12p.

Don't Call It a Comeback: The Criminological and Sociological Study of Subfelonies

By Issa Kohler-Hausmann

After featuring prominently in early law and society research, the study of sub-felony enforcement and processing was largely eclipsed by the study of mass incarceration. Of late, the subject matter has enjoyed a resurgence. This review addresses what things might be included in a study of sub-felonies, what aspects about them researchers have studied, and why it might be theoretically interesting to study them.

Annu. Rev. Criminol. 2022. 5:229–53  

Shakespeare's Legal Ecologies: Law and Distributed Selfhood

By Kevin Curran

Shakespeare’s Legal Ecologies offers the first sustained examination of the relationship between law and selfhood in Shakespeare’s work. Curran argues that law provided Shakespeare with the conceptual resources to imagine selfhood in social and distributed terms, as a product of interpersonal exchange or gathering of various material forces. Curran reveals Shakespeare’s distinctly communitarian vision of personal and political experience, the way he regarded living and acting in the world as materially and socially embedded practices. At the center of the book is Shakespeare’s fascination with questions fundamental to law and philosophy: What are the sources of agency? For whom am I responsible, and how far does responsibility extend? Curran guides readers through Shakespeare’s responses, paying attention to historical and intellectual contexts. The result is a new theory of Shakespeare’s relationship to law and an original account of law’s role in the ethical work of his writings.

Evanston, IL: Northwestern University Press, 2017.. 192p,