Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Crime
Dirty deals Case studies on corruption in waste management and trade

By Nancy Isarin, Claudia Baez Camargo and Amanda Cabrejo le Roux

Executive summary Waste management is a huge industry at the local, national and international levels. Public services play a key role in dealing especially with waste generated by households. Getting it right is essential if we are to achieve a circular economy and the Sustainable Development Goals. Complex legal frameworks and their weak implementation open up spaces for criminals to profit from illegally managing or trading in waste. The consequences on the environment and human health can be severe. The role of corruption in crimes involving waste is unexplored. An initial analysis of five cases shows the potential for corruption to play a role in: • influencing policy decisions involving waste management; • corrupt deals involving the selection of waste management companies linked to powerful elites; • schemes to gain lucrative waste management contracts through systematic bribery; • illegal imports of hazardous waste for profit, avoiding or suppressing formal controls. Different corruption risks affect different steps of the waste management chain: 1. Policies and procedures: Undue influence, state capture 2. Procurement: Bribery, nepotism, favouritism 3. Inspections: Bribery, undue influence, collusion External factors make corruption and crime linked to waste management easier to get away with, including: • poor record keeping and a lack of access to information even where records exist; • low awareness and understanding of the field among public procurement officers, law enforcement and the judiciary; • insufficient monitoring and lack of inspection and enforcement capacities; • poor cooperation between environmental, (financial) investigation and other government agencies. In addition to reforming the legal frameworks governing waste, basic steps to start addressing corruption risks are: • More research and corruption risk assessments on waste management supply chains Greater investment in preventive measures, starting with digitalising administrative processes. • More joined-up enforcement of waste management legislation through inter-agency cooperation and joint investigations. • Extending wider transparency and accountability measures like open data and whistleblowing systems to the waste management field. • Targeted capacity building and awareness raising for regulators and law enforcement. • Collective Action initiatives between public, private and civil society actors in the waste management field, to build trust and understanding, share good practices and co-develop self-regulatory standards.

Basel, SWIT: Basel Institute on Governance, 2023. 62p.

Punishing Safety Crime in England and Wales: Using Penalties That Work

By Angus K Ryan

Crime can evade detection and prosecution by criminal justice systems. This can include safety crime, briefly defined here as violations of law that either do, or have the potential to cause sudden death or injury as a result of work-related activities. Research estimates that 2.3 million people across the globe succumb to work-related incidents and diseases every year, and that safety crime causes nearly 900 annual deaths in Britain. Despite this largescale harm, safety crime fails to attract major political, public, or academic attention. One consequence of the lack of attention to safety crime in policy discussions is a significant gap in the body of knowledge on how to effectively punish safety criminals. This thesis aims to address how the effectiveness of penalties for safety criminals can be improved to reduce safety crime. To fulfil this aim, this study answers: which theories are currently informing the punishment of safety criminals in England and Wales? Which theories are effective at punishing safety criminals and why are they effective? How can penalties be used to effectively punish safety criminals? This qualitative study explores 21 stakeholders’ views on the relationship between the punishment of safety criminals and the prevalence of the theories of deterrence, retributive justice, rehabilitation, and incapacitation in England and Wales. The findings of this study indicate that there is a lack of punishment for safety criminals in England and Wales, and that the theories of deterrence, retributive justice, rehabilitation, and incapacitation can be used in varying degrees of effectiveness against these persons, typically dependent on how penalties are used to achieve these theories. The interview data suggests numerous methods of improving current penalties and effectively punishing safety criminals. This study concludes that a mixture of sanctions in a pyramid of penalties should be used to punish safety criminals more effectively.


Bristol, UK: University of Bristol, 2022. 300p.

Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape

By Jack Nicholls; Aditya Kuppa; Nhien-An Le-Khac

Machine Learning and Deep Learning methods are widely adopted across financial domains to support trading activities, mobile banking, payments, and making customer credit decisions. These methods also play a vital role in combating financial crime, fraud, and cyberattacks. Financial crime is increasingly being committed over cyberspace, and cybercriminals are using a combination of hacking and social engineering techniques which are bypassing current financial and corporate institution security. With this comes a new umbrella term to capture the evolving landscape which is financial cybercrime. It is a combination of financial crime, hacking, and social engineering committed over cyberspace for the sole purpose of illegal economic gain. Identifying financial cybercrime-related activities is a hard problem, for example, a highly restrictive algorithm may block all suspicious activity obstructing genuine customer business. Navigating and identifying legitimate illicit transactions is not the only issue faced by financial institutions, there is a growing demand of transparency, fairness, and privacy from customers and regulators, which imposes unique constraints on the application of artificial intelligence methods to detect fraud-related activities. Traditionally, rule based systems and shallow anomaly detection methods have been applied to detect financial crime and fraud, but recent developments have seen graph based techniques and neural network models being used to tackle financial cybercrime. There is still a lack of a holistic understanding of the financial cybercrime ecosystem, relevant methods, and their drawbacks and new emerging open problems in this domain in spite of their popularity. In this survey, we aim to bridge the gap by studying the financial cybercrime ecosystem based on four axes: (a) different fraud methods adopted by criminals; (b) relevant systems, algorithms, drawbacks, constraints, and metrics used to combat each fraud type; (c) the relevant personas and stakeholders involved; (d) open and emerging problems in the financial cybercrime domain.

IEEE Access ( Volume: 9), 2021, 22p.

Ransomware: Federal Agencies Provide Useful Assistance, but Could Do More

By David B. Hinchman,

Ransomware is a malicious software that encrypts files and leaves data and systems unusable. With ransomware attacks, hackers gain entry into a system, lock out users, and demand payment to regain access.

Homeland Security, FBI, and Secret Service help state, local, and other governments prevent or respond to ransomware attacks on systems like emergency services. Most government entities said they're satisfied with the agencies' prevention and response efforts. But many cited inconsistent communication during attacks as a problem. We recommended that the federal agencies address cited issues and follow key practices for better collaboration.

Washington, DC: U.S. Government Accountability Office, 2022. 70p.

Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience

By Mark Button · David Shepherd · Jeyong Jung

This paper explores the use of fake social media accounts for economic espionage. It focuses solely on the first step of the recruitment process, the link requests. There has been very little research on economic espionage and none on the use of fake social media profiles as a means of recruitment. The methodology is built upon an inductive approach based on a survey of 2,000 UK professionals who use social media for professional purposes to provide practical and theoretical insights into the problem drawn from a Qualtrics panel. The results illustrate that a quarter of professionals are ill-prepared for the threat of fake social media profiles for the purposes of espionage because they either do not check link requests or accept them even with risky attributes. It further finds a substantial minority are carelessly indifferent to information security and computer network security, and are so indifferent to the identities behind link requests that they auto-link with everyone. The paper also explores the homophily-heterophily orientation of professionals. It argues that homophily-orientated professionals tend to reject profiles with espionage characteristics, whilst heterophily-orientated professionals are susceptible because they embrace social difference. The practical implications are that employers need to strengthen their information security training programmes, the security services need to be more explicit in characterising the threats, and regulation is required to force the social media companies to focus on tackling the fake profle problem.

Security Journal (2025) 38:30

Global Developments in Trade-Based Money Laundering

By George Herbert

This rapid research review provides an overview of the current state of knowledge on the scale and dynamics of trade-based money laundering (TBML) and key challenges and opportunities in relation to TBML, both globally and in relation to the United Kingdom (UK) specifically. The study took place over ten days in August and September 2022, and involved a review of existing literature, as well as two interviews with experts. Much of the literature reviewed originated from international organisations and publications by national governments, supplemented by news reports and publications by private sector firms.

K4D Emerging Issues Report 55.

Brighton, UK: Institute of Development Studies. .2022.165p.

Understanding the characteristics of serious fraud offending in the UK

By Michael Skidmore and Beth Aikenhead

This study aims to improve our understanding of the most serious fraud offences perpetrated in the UK, specifically the diversity of methods for committing these crimes, the characteristics and pathways of offenders involved and where applicable, how the groups or networks of offenders operate. This is an exploratory study which used qualitative data taken from the documents compiled by police practitioners in 25 separate criminal investigations. The cases included in this analysis do not constitute a representative sample of frauds in England and Wales during this period. The selection of cases reflects the choices made by the research team to incorporate a diversity of methods, offenders and settings to capture the breadth of fraud. Furthermore, the sampling frame is the product of practitioner choices over which crimes to assign investigation by specialist teams; these are a limited resource and due to the challenges of international investigation, will likely prioritise offending that has a footprint in the UK. Furthermore, in focusing on frauds that were perpetrated (at least in part) from within England and Wales it does not represent fraud offending that emanates from other countries. The specific fraud cases were serious for different reasons; high financial losses (£100,000 or more), high volume offending (50 or more known victims) and high victim impact (assessed by the victim and/or police practitioner). These dimensions of harm reflect those used in practitioner assessments for deciding which frauds are high harm and a priority for intervention. Only three cases satisfied all three harm criteria, all of which involved the mis-selling of investments. Twelve cases satisfied only one criterion and those linked to each dimension of harm were associated with different methods and victims; all cases that fulfilled the high financial loss criterion had defrauded businesses, and two out of three that fulfilled the high-volume criterion involved taking advance payment from consumers In five cases the scale of victimisation and impact was hidden, but they were included because they involved high-risk offenders suspected of being engaged in serious and complex offending. There was considerable diversity in the methods for perpetrating serious fraud and this study borrows from a typology of acquisitive crime developed in a previous study (Naylor, 2002). This model provided a good fit for distinguishing serious frauds on the basis of two overarching models of offending, and this delineation simultaneously revealed distinctions in the situational context, victim and offender profiles: • Commercial frauds: perpetrated from within a legitimate or pseudo-legitimate business setting and included the sale of investments or the mis-selling of products or services online or face-to-face, and nearly all had victimised individual members of the public. • Predatory frauds: involved theft by impersonating legitimate individuals or organisations, mostly by offenders operating from outside of a business setting and without the pretence of a legitimate commercial exchange. The victim profile was more varied, and over half had victimised businesses (for example, payment diversion fraud). There was divergence in the types of fraud offence encompassed by each category of fraud.

London: Police Foundation 2023. 39p.

Serious Incidents Annual Report 2023/24

By The Youth Justice Board (UK)

Key findings The Serious Incident Annual Report provides a comprehensive overview of 438 serious incidents notified to the Youth Justice Board (YJB) in 2023-24 and the 546 children involved, highlighting key themes and recommendations. Whilst serious incident reporting has been mandatory for youth justice services (YJSs) since April 2022, this is the first year of published findings. A summary of the key findings is below. Whilst there are limitations to this data (please see section 2.1 Data Limitations), this report underscores the importance of addressing exploitation, knife crime, and the vulnerabilities of children with special educational needs or who are neurodivergent. It also highlights the need for timely, effective interventions which address underlying causes, and support to prevent children from being involved in serious incidents. To learn more about the notification process itself, please see the Serious incidents notification: standard operating procedures for YJSs - GOV.UK Criminal exploitation • 41% of all children notified were said to be gang affiliated, criminally exploited, or involved with the National Referral Mechanism (NRM) process1; 42% of all boys and 29% of all girls. • 20% of all children notified had exploitation concerns identified relating to the charge, of these; 58% an NRM referral was due to be made and 42% had a previous NRM referral but were awaiting a decision. Offence types • 55% of all notifications were for Grievous Bodily Harm (GBH), 16% for Rape, 13% for Murder/Manslaughter, 9% Attempted Murder and 3% Terrorism offences. • 56% of incidents notified were knife/blade enabled. • 92% of Attempted Murder notifications indicated there was knife or blade involvement, 84% of Murder/Manslaughter, and 62% of Grievous Bodily Harm incidents. • Rape charges increased from 8-13% of overall notifications when compared to the previous year. Contact with services • 36% of all children charged were under the supervision of a youth justice service at the time of the incident. • 24% were not known to YJSs, nor were they engaged in support from any other local authority service at the time of the incident. • 49% of children notified had no previous cautions and convictions, increasing to 92% for children charged with terrorism offences. • 71% of children notified for murder were not supervised by a youth justice service at the time of the incident, but were known to other agencies, social care, education, health. • 63% had some kind of previous contact with a local authority or Children and Adolescent Mental Health Service (CAMHS), of these 24% were engaged with both the youth justice service and one or more other services at the time of the incident. Safeguarding and vulnerabilities • Of the 63% who had some kind of previous contact with a local authority or CAMHS service; o 29% were identified as Children in Need or in Wales, Children with care and support needs o 19% were subject of a Child Protection Plan o 27% were in the care of the local authority as a looked after child, with 48% of these reported to have gang involvement and/or exploitation concerns. • 23% of children reported had identified Special Educational Needs, in Wales Additional Learning Needs/Neurodiversity. Of these; • 19% had an Education Health Care Plan (EHCP) or in Wales Individual Development Plans • 48% were diagnosed with Attention Deficit Disorder (ADD) or Attention Deficit Hyperactivity Disorder (ADHD) or Autistic Spectrum Disorder (ASD) • 53% reported risks associated with exploitation. • 43% of children notified due to their death whilst under the supervision of the youth justice service were victims of murder and 19% died by suicide. Demographics and over-representation • 96% of the children notified were boys • 68% of the children notified were 16-17 years old; 99% of these were boys. • 48% of all children notified were from ethnic minority backgrounds and significantly overrepresented compared to the general 10-17 population (27%) • 17% of children reported were from Black backgrounds and significantly overrepresented compared to the general 10-17 population (6%) • 17% of children reported were from Mixed backgrounds and significantly overrepresented compared to the general 10-17 population (6%) Timeliness of investigations and decision making • Rape offences took the longest from offence to charge, averaging 380 days, followed by terrorism offences at 230 days. • 32% of all incidents took longer than 180 days from offence to charge. • 17% of children notified were reported as being on bail for another matter at the time of the incident.

London: YJB, 2025. 38p.

Exploring banditry in Nigeria

By Sara T. Thompson

Banditry is a current problem in Nigeria. Historically, banditry has been a problem around the world. A review of the trends of banditry can help to identify and understand patterns that are present related to such criminal activity. To further understand and analyze this problem, this paper outlines the methodology for the systematic collection and creation of one major dataset that provides detailed information about bandit attacks in Nigeria. A review of around 1200 publications from peer-reviewed journals, news articles, and other relevant publications containing information about bandit attacks in Nigeria resulted in a dataset containing a sample of almost 1000 bandit attacks over the course of a decade in Nigeria. Upon analysis of this dataset, there are spatial concentrations related to where bandit attacks occurred as well as the identifcation of common types of bandit attacks. This paper concludes with recommendations for future research.

Security Journal, 2025, 17p.

Decoding Crypto Crime: A Guide for Law Enforcement

By The Organization for Security and Co-operation in Europe

The Organization for Security and Co-operation in Europe (OSCE) is proud to release a practical resource designed to empower law enforcement officers, prosecutors, and stakeholders in tackling cryptocurrency-related crimes. The guide "Decoding Crypto Crime: A Guide for Law Enforcement" simplifies complex concepts like blockchain technology and virtual assets, offering best practices for investigating common crypto crimes such as investment scams, extortion, and phishing.

It provides actionable steps for collecting critical evidence, interacting with Virtual Asset Service Providers (VASPs), and utilizing blockchain analytics tools. Recognizing the challenges victims face, the guide also offers support strategies and emphasizes the importance of cross-jurisdictional collaboration. While not exhaustive, this guide serves as a foundational tool to bridge the knowledge gap and enhance law enforcement’s ability to navigate the rapidly evolving world of crypto crime. Download the guide today to strengthen your capacity to combat digital financial crime and ensure a safer digital landscape.

Prague: OSCE, 2025. 64p.

Crypto, Corruption, and Capital Controls: CrossCountry Correlations 

By Marwa Alnasaa, Nikolay Gueorguiev, Jiro Honda, Eslem Imamoglu, Paolo Mauro, Keyra Primus, and Dmitriy Rozhkov 

  The emergence of crypto-assets (private digital assets that depend primarily on cryptography and distributed ledger technology for record keeping) has unleashed a plethora of financial innovation that will likely revolutionize the form of money and the ways it is used. These developments create opportunities as well as risks. As noted, for example, by a group of G-20 policymakers, “…technological innovation, including that underlying crypto-assets, has the potential to improve the efficiency and inclusiveness of the financial system and the economy more broadly,” but “crypto-assets […] raise issues with respect to consumer and investor protection, market integrity, tax evasion, money laundering and terrorist financing.” The pseudonymity of crypto-assets (whereby transactions require only digital identities) makes them a potential vehicle for illicit flows, including flows of proceeds from corruption. This pseudonymity is not an intrinsic feature of the underlying technology, but rather a choice made in the design and practice of most currently existing crypto-assets. Whereas cash provides full anonymity and large denomination bills have long been considered an aid for crime and tax evasion (Rogoff 2017, Chodorow-Reich et al. 2020), crypto-assets in their current form make it possible to move even larger amounts speedily and with greater ease, including across national borders (Graf von Luckner et al., 2021). As crypto-assets rapidly gain macroeconomic relevance (International Monetary Fund 2021) and policymakers consider the optimal degree of regulation, it is urgent to bring empirical evidence to bear on the question of whether crypto-assets facilitate corruption. Likewise, it is helpful to explore the extent to which crypto-assets are used to circumvent capital controls, for countries where these are in place, and whether crypto-assets are more likely to gain traction in countries where the local currency has historically not been a secure store of value. There are also potential benefits of the technologies that crypto-assets are based on. In particular, prudently designed central bank digital currencies could offer additional resilience, safety and availability with lower costs. These technologies could also be used to improve transparency and record-keeping for procurement or other payments related to government projects, thereby increasing accountability, and reducing the scope for corruption. Likewise, property and registry systems could be enhanced, reducing red tape, and streamlining processes. However, these initiatives are currently less advanced or widespread than crypto-assets. Empirical investigation of the factors underlying the growing usage of crypto-assets is in its infancy, owing to data limitations. In this paper, we present a simple cross-country analysis drawing on recently released survey-based data. We explore the correlation of crypto-asset usage with indicators of corruption, capital  controls, a history of high inflation, and other factors. We find that crypto-asset usage is significantly and positively associated with corruption and capital controls. Whereas the small sample size and uncertain quality of the data on crypto-assets implies that our results must be interpreted with caution, it is also worth recalling that measurement error tends to reduce the likelihood of finding a significant empirical association; significant results with low-quality data are thus worth paying attention to. With these caveats in mind and considering the urgency of acting before it is too late, rather than waiting for conclusive evidence, we believe that, on balance, our results add to the case for regulating crypto-assets, including know-your-customer approaches, as opposed to taking a laissez-faire stance. 

Washington, DC: International Monetary Fund, 2022. 19p.

Seizing the opportunity: 5 recommendations for crypto assets-related crime and money laundering

By Europol

These recommendations follow the 6th Global Conference on Criminal Finances and Cryptocurrencies on 1–2 September 2022. The conference was hosted by Europol at its headquarters in The Hague, the Netherlands, together with the Basel Institute on Governance through the Joint Working Group on Criminal Finances and Cryptocurrencies.

The Recommendations are intended to highlight broad approaches and best practices. They are designed to help public and private actors stay one step ahead of those seeking to abuse crypto assets (also known as virtual assets) and services to make, hide and launder illicit money.

The main message is that as the use of crypto assets expands into practically every country and sector, so does its abuse to commit new forms of crime and launder criminal proceeds. Yet with the right tools, capacity and cooperation, the unique characteristics of blockchain-based technologies offer an unprecedented opportunity to investigate organised crime and money laundering networks and to recover stolen funds.

The five recommendations cover:

  1. Breaking down silos between “traditional” and “crypto”

  2. Regulating broadly and make full use of existing laws 

  3. Taking advantage of the blockchain to disrupt organised crime 

  4. Raising crypto literacy through capacity building and clear communication 

  5. Increasing public-private cooperation

Europol and Basel Institute on Governance, 2022.  6p.

Cybercrime Classification and Measurement

By National Academies of Sciences, Engineering, and Medicine.

Cybercrime poses serious threats and financial costs to individuals and businesses in the United States and worldwide. Reports of data breaches and ransomware attacks on governments and businesses have become common, as have incidents against individuals (e.g., identity theft, online stalking, and harassment). Concern over cybercrime has increased as the internet has become a ubiquitous part of modern life. However, comprehensive, consistent, and reliable data and metrics on cybercrime still do not exist - a consequence of a shortage of vital information resulting from the decentralized nature of relevant data collection at the national level.

Cybercrime Classification and Measurement addresses the absence credible cybercrime data and metrics. This report provides a taxonomy for the Federal Bureau of Investigation for the purpose of measuring different types of cybercrime, including both cyber-enabled and cyber-dependent crimes faced by individuals and businesses, and considers the needs for its periodic revision. 

Washington DC: National Academies Press, 2025. 259p.

Crime in the Digital Age: Do Cyber Attacks Lead to Identity Theft?

By Claudio Mezzetti,  keshini muthukuda,  Haishan Yuan

We study whether data hacking of local organizations causes an increase in identity theft in the organization's local area. We use a difference in differences approach exploiting the timing of incidents of hacking and identity theft in the USA from 2015 to 2018, and estimate a fixed effects model that includes time and Core Based Statistical Area, or County, fixed effects. We find that a hacking incident in a local organization leads to 0.792 to 1.044 more identity thefts per 10,000 population in the local area the following year. The increase represents a 42% to 77% increase in the average prevalence of identity theft. We also show that among all our controls the unemployment rate is the most significant predictor of identity theft.

Mezzetti, Claudio and muthukuda, keshini and Yuan, Haishan, Crime in the Digital Age: Do Cyber Attacks Lead to Identity Theft? (April 24, 2024).

Murder By Contract: Targeted killings in eastern and southern Africa

By Kim Thomas

  Targeted killings instil fear, silence activists and whistle-blowers, corrode democracies, and assist criminal actors in achieving their goals. The criminal economies of Kenya, Mozambique and South Africa are marked by these killings for social, political or economic gain. Yet, their nature and extent remain underexplored. We have chosen these three countries for analysis for several reasons. South Africa has a long history of targeted violence in various sectors of society, and our established database on the country provided a methodological framework for expanding the study. Kenya was chosen, as it has struggled not only with political violence, but also organized crime and gang culture, all of which, based on our South African research, provide a foundation for assassinations. Its fairly extensive media coverage also provided a good framework for the study. Although Mozambique’s media coverage is limited and less free, Mozambique was included in the study because our ongoing fieldwork there has revealed that targeted killings are prevalent in the country, particularly in manipulating political outcomes. The sociopolitical landscape of these three countries, although different from one another, all have commonalities that are conducive to targeted killings. South Africa has a long-standing history of violence deployed to achieve various political or economic outcomes, as was seen during the apartheid government’s administration and in the various post-democratic political party struggles. Violence in the mass-transit minibus-taxi industry as well as interpersonal violence are not new to the country. However, the use of targeted violence, by means of contracting a third party, to achieve political, economic or personal gain is something that has increased over the past two decades. Previous research on assassinations in South Africa by the Global Initiative Against Transnational Organized Crime (GI-TOC) has revealed that targeted violence increased from 2000 to 2017 and that there were particularly high rates of assassinations in the KwaZulu-Natal province, owing to both political motives and the taxi industry’s power struggles and conflict over routes. The research further revealed that, nationally, the taxi industry made up over 40% of the assassinations during that data period. Continued data collection and analysis up to 2020 seeks to determine if these trends are continuing or if there have been any significant changes in the targeted-killing landscape.  Kenya, although not as violent as South Africa, also has a history of political struggles and interconnectedness of the state and organized crime. This relationship is particularly evident in the deployment of gangs by politicians to intimidate the opposition and rally support for their campaigns. Kenya’s matatu industry, much like South Africa’s taxi industry, is also deeply criminalized. The industry experiences high levels of extortion, intimidation and corruption. Kenya has also experienced various land disputes over the years, which have led to violence and assassinations. It is in light of all these factors and their similarities with the South African landscape for assassinations, that the Kenyan database was compiled to determine the extent of these assassinations and their impact in Kenya. Mozambique has long been afflicted with political instability and violence. The current insurgency in the northern province of Cabo Delgado is one of many examples of the violence that has plagued the country. Although our research picked up some assassinations related to terrorism in the region, they were generally excluded from our database, as they were not linked to organized crime and did not fit within our methodological criteria. This is consistent with our field research in the country that has shown that the Islamic militants are in fact not profiteering from the illicit economy. The GI-TOC’s ongoing research in the country, as well our network of local journalists, has revealed that assassinations, particularly politically motivated ones, are having a profound impact on Mozambican society and democracy. This was first documented in a short GI-TOC data collection and article on the problem titled ‘Mozambique’s quiet assassination epidemic’. It is in light of this research that we decided to expand the database to better understand this phenomenon. As a result of the contexts in these countries, and their histories of violence, there are sources of violence available to those who have historically deployed it. This experience, coupled with dire social circumstances and limited economic opportunities, as seen in the context of Kenyan and South African gangs, creates reservoirs of violence that fuel targeted killings.8 Once involved in the business of targeted killings, the hired hitmen become vulnerable themselves. Interviews with hitmen in Cape Town gangs revealed that they were often as vulnerable as those whom they killed. In the gang context particularly, hitmen often exist outside of the formal gang structure and as a result do not have protection from gangs. However, they are still beholden to the gang bosses.  

Geneva:  Global Initiative Against Transnational Organized Crime , 2021. 64p.

Homicide in Australia 2023–24

By Hannah Miles Samantha Bricknell

The National Homicide Monitoring Program is Australia’s only national data collection on homicide incidents, victims and offenders. This report describes 262 homicide incidents recorded by Australian state and territory police between 1 July 2023 and 30 June 2024. During this 12-month period there were 277 victims of homicide and 278 identified offenders

Statistical Report no. 52.

Canberra: Australian Institute of Criminology. 2025. 77p.

Countering Ransomware Financing

By The Financial Action Task Force (FATF)

Ransomware attacks target individuals, businesses and government agencies, across the world. The impact of these attacks can be devastating for individuals, government agencies and business activity and even disrupt essential infrastructure and services.

This FATF report analyses the methods that criminals use to carry out their ransomware attacks and how payments are made and laundered. Criminals are almost exclusively using crypto, or virtual assets and have easy access to virtual asset service providers around the world. Jurisdictions with weak or non-existent AML/CFT controls are therefore of concern.

The report proposes a number of actions that countries can take to more effectively disrupt ransomware-related money laundering. This includes building on and leveraging existing international cooperation mechanisms, given the transnational nature of ransomware attacks and related laundering. Authorities also need to develop the necessary skills and tools to quickly collect key information, trace the nearly instantaneous financial transactions and recover virtual assets before they dissipate. The multi-disciplinary nature of ransomware also means that authorities must extend their collaboration beyond their traditional counterparts to include cyber-security and data protection agencies.

The FATF also finalized a list of potential risk indicators that can help public and private sector entities identify suspicious activities related to ransomware.

Paris: The Financial Action Task Force (FATF) 2023. 54p.

The Effect of Education Policy on Crime: An Intergenerational Perspective

By Costas Meghir Marten Palme Marieke Schnabel

We study the intergenerational effect of education policy on crime. We use Swedish administrative data that links outcomes across generations with crime records and we show that the comprehensive school reform, gradually implemented between 1949 and 1962, reduced conviction rates both for the generation directly affected by the reform and for their sons. The reduction in conviction rates occurred across many types of crime. Key mediators for this reduction in the child generation are an increase in education and a decline in crime amongst their fathers.

COWLES FOUNDATION DISCUSSION PAPER NO. 2356, New Haven, CT: Yale University, 2023. 40p.

Pregnancy-Associated Mortality Due to Homicide, Suicide, and Drug Overdose

By Maeve E. Wallace; Jaquelyn L. Jahn

IMPORTANCE Despite growing national concern about high and increasing rates of pregnancyassociated mortality due to homicide, suicide, and drug overdose, state-level incidence has previously not been available. OBJECTIVE To identify cases of pregnancy-associated homicide, suicide, drug overdose, and deaths involving firearms in the US from calendar year 2018 to 2022 and estimate 5-year proportionate mortality and mortality ratios per 100 000 live births by state and cause of death. DESIGN, SETTING, AND PARTICIPANTS This cross-sectional study is a population-based analysis of the 2018-2022 restricted-use mortality files provided by the National Center for Health Statistics. These data include all deaths occurring in the US, with geographic identifiers for state of residence. All records in which the decedent was female aged 10 to 44 years and pregnant at the time of death or up to 1 year earlier were included in the analysis. Data were analyzed from July 1 to December 1, 2024. MAIN OUTCOMES AND MEASURES International Statistical Classification of Diseases and Related Health Problems, Tenth Revision codes for underlying cause of death were used to identify cases of homicide, suicide, drug overdose, and deaths involving firearms occurring in each state from 2018 to 2022. Proportionate mortality was estimated as the count of cases divided by the total count of deaths of pregnant and postpartum women in each state. Cause-specific mortality ratios were estimated as the count of cases divided by the total count of live births in each state from 2018 to 2022. RESULTS Nationally, there were 10 715 deaths of people who were pregnant or within 1 year post partum from 2018 to 2022, including 837 homicides, 579 suicides, 2083 drug overdoses, and 851 that involved firearms. Proportionate mortality and mortality ratios for homicide, suicide, and drug overdose varied across the US. Of states with more than 9 cases, pregnancy-associated homicide mortality was highest in Mississippi (12.86 per 100 000 live births), pregnancy-associated suicide mortality was highest in Montana (21.55 deaths per 100 000 live births), and pregnancy-associated drug overdose was highest in Delaware (36.03 deaths per 100 000 live births). Firearms accounted for as many as 15.56% of pregnancy-associated deaths in Colorado, and pregnancy-associated firearm mortality was highest in Mississippi (13.42 deaths per 100 000 live births). CONCLUSIONS AND RELEVANCE The information in this study may provide relevant guidance for state and local intervention strategies to advance the health, safety, and well-being of women during pregnancy and beyond.

JAMA Network Open. 2025;8(2):e2459342. doi:10.1001/jamanetworkopen.2024.59342 (R

A Randomized Controlled Trial of the Scenarios and Solutions Gang Prevention Program

By Stacy Calhoun

This randomized controlled trial to assess the effectiveness of a curriculum-based gang prevention program in addressing gang risk factors within a school setting encountered delays and challenges in implementing the program and completing the study. Despite challenges, progress was made as the clinic adapted to the evolving circumstances. Although the clinic lost its dedicated space, it successfully established Memorandums of Understanding (MOUs) with two new school districts where they implemented their universal screening program and services at one middle school and two high schools. Despite efforts by the clinic team, school staff, and SSGP facilitator to enhance student engagement during the project performance period through special events, motivating students to submit signed enrollment forms and to attend clinic and group appointments remained challenging. Participation in this study allowed the clinic to significantly expand its focus, addressing gang risk factors on a much broader scale than before. Despite facing substantial challenges, including adapting to COVID-19 disruptions, forming relationships in new school districts with differing policies, and coping with the loss of dedicated clinical space and staff, the clinic has remained committed to refining their processes to better support these students. Moreover, the clinic has taken a proactive role in educating stakeholders about the potential of integrating gang prevention services within school-based systems of care.

Los Angeles: Department of Psychiatry and Biobehavioral Sciences University of California, Los Angeles, 2024. 29p.