Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in Social Science
An Analysis of Robbery in Oklahoma Using Incident-Based Reporting Data (SIBRS)

By Kara Miller, Monique Mogilka,

The Oklahoma Statistical Analysis Center (SAC) is co-located with the state’s criminal history repository, the state’s Uniform Crime Reporting (UCR) Program, and the State Incident Based Reporting (SIBRS) Program. The purpose for studying robbery in Oklahoma is to increase access to and understanding of National Incident-Based Reporting System (NIBRS) enhanced data. By analyzing NIBRS compatible data, the SAC strives to demonstrate the value SIBRS data can have for local agencies and government planners, as well as its utility for problem solving and understanding larger aspects of crimes reported in Oklahoma. The SAC and the Oklahoma State Bureau of Investigation (OSBI) demonstrate the value and utility of SIBRS data to encourage all local law enforcement agencies (LEAs) in Oklahoma to commit to SIBRS reporting and to report quality data. Key Findings:    The number of robberies reported varied nearly every month during the year, although the overall trend was an increase in reports between January and August. The number of reported robberies then fluctuated significantly between August and November. During this time period, reported robberies: o decreased 41.0% from August to September, o Increased 95.7% from September to October, and o Decreased 42.2% from October to November. The majority of robbery victims did not know the offender, as 60.9% of Victim to Offender Relationships were classified as Not Known to Victim. 33.9% of robberies were at a residence, with 40.5% of residential robberies occurring between 21:00-03:00. 1  61.1% of arrestees were arrested “On-View”, and only 25.0% were armed.  Money was the most commonly reported property type stolen (26.3%). However, automobiles which accounted for only 3.9% of the types of property stolen, accounted for 38.8% of the total value of stolen property. 

Oklahoma City: Oklahoma State Bureau of Investigation, 2020? 81p.

Gender and Justice: Violence, Intimacy, and Community in Fin-de-Siécle Paris

May Contain Markup

By Eliza Earle Ferguson

Crimes of Passion: The book explores how crimes of passion,particularly those involving intimate violence, were understood and treated in fin-de-siècle Paris. These acts were often seen as love stories gone wrong and were frequently acquitted.

Gender Dynamics: It highlights the gendered nature of intimate violence, showing how men and women experienced and justified violence differently, often influenced by societal norms and economic conditions.

Community and Legal Interactions: The document discusses the role of community networks and the legal system in addressing intimate violence, revealing tensions between local knowledge and state power.

Historical Context: The book situates these issues within the broader social and cultural context of 19th-century Paris, providing a detailed analysis of how intimate violence intersected with gender, class, and urban life.

JHU Press, Mar 19, 2010, 268 pages

It's a Bird, It's a Plane, It's Superman! Using Mass Media to Fight Intolerance

By Alex Armand, Paul Atwell, Joseph Gomes, Giuseppe Musillo, Yannik Schenk

This paper investigates the role of mass media in shaping racial tolerance and advancing civil rights in the post-WWII United States. We study the first attempt in the history of mass media to use a radio broadcast targeted at children to promote an inclusive American society. In 1946, amid persistent racial divisions, the popular radio series The Adventures of Superman launched Operation Intolerance, a sequence of new episodes promoting equality, rejecting racial discrimination, and exposing the KKK's bigotry. Using digitized historical data on U.S. radio stations and state-of-the-art radio propagation models, we compute geographic exposure to the broadcasts. Exploiting exogenous exposure to the broadcasts, we employ a cohort study design to analyze individual-level data from 1964 to 1980–a crucial period for civil rights activism and legislation in the United States. We find lasting impacts on those exposed as children, including increased support for civil rights, improved interracial relations, and more progressive political attitudes. These effects translate into greater alignment with the Civil Rights Movement, evidenced by increased support for protests and diminished institutional trust, and further manifested by reduced participation in the Vietnam War. Additionally, county-level panel data illustrate how areas covered by the broadcast in 1946 evolve towards less segregationist attitudes, a lower presence of the KKK, and an increase in civil rights activism and prominence in discourse.

Bonn: Institute of Labor Economics, 2024.

Research Compilation on Online Antisemitism

By Institute for Strategic Dialogue

From mainstream to extreme, from far left to far right, and large platforms to fringe ecosystems, antisemitism on social media is a universal challenge. For many years and across different events, geographies, and languages, ISD has sought to understand, track, and analyze online antisemitism. This document aims to synthesize ISD’s findings, providing a summary of relevant literature as a tool for informing the work of ISD’s Coalition to Counter Online Antisemitism.

London: Institute for Strategic Dialogue, 2024. 17p.

A Year of Hate: Anti-Drag Mobilisation Efforts Targeting LGBTQ+ People in France

By The Institute for Strategic Dialogue

In the last year, a loose network of actors from Bordeaux to Toulouse to Paris targeted drag events aimed at all-ages audiences for protest, harassment, and abuse. The behaviors and dynamics observed among these actors echo and mirror those observed in other parts of the world, particularly the US. While anti-drag action in France remains marginal compared to the activity witnessed in the US, UK, and Australia, it nonetheless emerged as a phenomenon from a standing start in 2022. March 2023 saw the nation’s first in-person protest at an all-ages drag event in Paris, and two months later a far-right group protested with banners and a smoke bomb outside of a library hosting a drag queen story hour (DQSH) for children in the small village of Saint-Senoux. A seemingly unlikely group of actors is leading this charge. The French anti-gender movement, which was at the heart of the movement against equal marriage in the early 2010s, has been joined by far-right parties and politicians, extremist groups, COVID-19 skeptics, and assorted conspiracy theorists. All are seeking to cancel drag events through tactics of protest, petitions, harassment, misinformation, and intimidation. This briefing provides an in-depth analysis of five cases of anti-drug mobilization in the period December 2022 – May 2023, using a combination of ethnographic methods and social media data analysis to examine activity related to each case. The first was in Bordeaux, the second in Lamballe-Armor, the third in Toulouse, the fourth in Paris, and the fifth in Saint-Senoux. While the earlier campaigns largely manifested online with limited in-person mobilization, the two most recent events saw increased offline activity. This report aims to summarise the key narratives, tactics, and actors involved in anti-drag action in France, and how these mobilizations are tied to anti-LGBTQ+ activity in France more broadly. However, given the small number of instances of anti-drug activism in France, the conclusions of this report are indicative and tentative.

London: Institute for Strategic Dialogue, 2024. 24p.

Positive Online Interventions Playbook: Innovating Responses to a Shifting Online Extremist Landscape in New Zealand

By The  Institute for Strategic Dialogue

The rapidly evolving online extremist landscape in New Zealand means new strategies for intervention are needed. This playbook – developed in consultation with New Zealand’s rich tapestry of civil society, communities, and practitioners engaged in prevention – offers practical frameworks for projects promoting positive online interventions to tackle online extremism. Based on an analysis of the rapidly evolving landscape of online extremism, the playbook takes stock of established and emerging intervention models. It brings together domestic and international best practices and suggests potential avenues for new positive intervention approaches. Finally, it reflects on practical considerations for programming, including monitoring and evaluation, safeguarding, operational security, and ethical considerations. This playbook examines the shift from violent groups to online extremism, highlighting digital literacy, audience communication, and proactive engagement with at-risk individuals.

London: Institute for Strategic Dialogue, 2024. 37p.

Social Processes of Online Hate

 Edited by Joseph B. Walther and Ronald E. Rice

This book explores the social forces among and between online aggressors that affect the expression and perpetration of online hate. Its chapters illustrate how patterns of interactive social behavior reinforce, magnify, or modify this expression. It also considers the characteristics of social media that facilitate social interactions that promote hate and facilitate relationships among haters. Bringing together a range of international experts and covering an array of themes, including woman abuse, antisemitism, pornography, radicalization, and extreme political youth movements, this book examines the specific social factors and processes that facilitate these forms of hate and proposes new approaches for explaining them. Cutting-edge, interdisciplinary, and authoritative, this book will be of interest to sociologists, criminologists, and scholars of media, communication, and computational social science alike, as well as those engaged with hate crime, hate speech, social media, and online social networks.

London; New York: Routledge, 2025.

Cutting the Head off the Snake: Addressing the Role Technology Plays in the County Lines Model 

By Joe Caluori, Violette Gadenne, Elen Kirk, and Beth Mooney

The National Crime Agency published its first intelligence assessment of county lines in 2015.  Ever since, there has been a growing interest in county lines from the media, public policy, and the world of research. Crest Advisory has published research that has contributed to the body of evidence, among other things, on the socio-economic determinants of individual vulnerability to exploitation, shining light on ways to mitigate those risks. This project, however, takes a different approach, by honing in on the specific role played by technology in county lines. In this report, ‘technology’ is used to refer to electronic or digital devices or services predominantly those used for personal communication. By including devices and services in our definition we incorporate both physical hardware such as mobile phones or smartwatches, and software such as applications provided by social media platforms. Technology plays an ever-increasingly important role in our day-to-day lives. Data from the Office for National Statistics (ONS) show that the proportion of adults who use the internet daily has increased from 35 percent of the UK population in 2006 to 89 percent in 2020. The nature of this usage has also changed dramatically, with social media increasing in influence significantly over the years. In 2021 TikTok, a social media platform designed for sharing short videos, overtook Google for the first time as the most popular site worldwide.5 Just as modern technologies are now an essential aspect of modern society, technology is intrinsic to the county lines model. The mobile phone, or the ‘line’ it facilitates, enables communications between those running the lines, those distributing the drugs, and those buying and using the drugs. Current approaches to disrupting county lines rely heavily on mobile communications technology (e.g. cell site analysis, or digital forensics gained from burner phones, personal smartphones, or other digital devices). However, the role of technology as an enabler of child criminal exploitation (CCE) is both under-represented and poorly understood in published research and literature. The Government has announced an intention to “cut the head off the snake” of county 6 lines. To understand what is required to do this, it is necessary to explore the dynamics of the country lines model, as well as examine its weaknesses. There is an acute need to better understand and monitor technological evolutions within county lines and analyze their implications for CCE. Only by understanding and responding to the role of technology can the Government and law enforcement leaders produce an effective national plan to ‘cut the head off the snake’ of county lines. Recent public policy developments have put the role technology plays in enabling crime in sharp focus. Social media and online platforms have seen perhaps the most dramatic rise in interest. Even though at the time this report is being drafted, the Online Safety Bill has been put on hold, much ink has been spilled on its value, its potential impact on privacy, and what should be included in such legislation. High-profile cases, such as the events leading to the 6th January attack on the United States Capitol in 2021, have shown the potential harm that can be caused by online communication. More generally, as we become more and more dependent on tech for all aspects of our lives, it is crucial that law enforcement keeps pace with its development concerning crime

London: Crest Advisory, 2022. 37p.

The Determinants of Bicycle Theft and Robbery in the City of Bogotá, Colombia

By Pablo Ruiz, Sergio Cabrales, Andrés Medaglia, Olga Sarmiento

Bicycle theft and robbery affect the number of bicycle users because since repetitive occurrence of these crimes may stop victims from bicycling. Interest in studying these particular crimes has grown in the past few years and studies have focused on analyzing preventive measures. Criminology theories have been the base for these studies as they associate different factors of the environment and social behavior with the occurrence of criminal activities. This paper aims to analyze bicycle theft and robbery in the city of Bogotá, Colombia using a fixed effects Poisson model for panel data between 2014 and 2017. Different environmental factors such as violent crimes, public amenities, land use features, and socioeconomic attributes, were evaluated against the occurrence of these incidents within specified areas that divide the city. Results show that violent areas increase the risk of bicycles being stolen, as well as areas with a high number of bicycle racks and bus stations. Additionally, results show that there is no significant evidence that socioeconomic differences are determinants to the occurrence of these crimes. The results of this study are relevant to potential policy measures regarding bicycle theft and robbery prevention, which range from security measures in certain areas given the evident relation that violence has on these crimes, crime hot spot intervention and environmental design towards crime prevention. 

Unidas, 2018. 

Interventions for Intimate Partner Violence During the Perinatal Period: A Systematic Review

By Olivia Mercier, Sarah Yu Fu, Rachel Filler, Alexie Leclerc, Kari Sampsel, Karine Fournier, Mark Walker, Shi Wu Wen, Katherine Muldoon

Background: Intimate partner violence (IPV) is a prevalent global health problem. IPV that occurs before pregnancy often continues during the perinatal period, resulting in ongoing violence and many adverse maternal, obstetrical, and neonatal outcomes.

Objectives: This scoping review is designed to broadly capture all potential interventions for perinatal IPV and describe their core components and measured outcomes.

Search Methods: We conducted a search for empirical studies describing IPV interventions in the perinatal population in June 2022. The search was conducted in MEDLINE, EMBASE, PsycInfo, CINAHL, Cochrane Central Register of Controlled Trials, Web of Science, Applied Social Sciences Index & Abstracts, ClinicalTrials.gov and MedRxiv. Hand-searching of references from select articles was also performed.

Selection Criteria: Included studies described an intervention for those experiencing IPV during the perinatal period, including 12 months before pregnancy, while pregnant or in the 12 months post-partum. The search encompassed January 2000 to June 2022 and only peer-reviewed studies written in either English or French were included. Included interventions focused on the survivor exposed to IPV, rather than healthcare professionals administering the intervention. Interventions designed to reduce IPV revictimization or any adverse maternal, obstetrical, or neonatal health outcomes as well as social outcomes related to IPV victimization were included.

Data Collections and Analysis: We used standard methodological procedures expected by The Campbell Collaboration.

Main Results: In total, 10,079 titles and abstracts were screened and 226 proceeded to full text screening. A total of 67 studies included perinatal IPV interventions and were included in the final sample. These studies included a total of 27,327 participants. Included studies originated from 19 countries, and the majority were randomized controlled trials (n = 43). Most studies were of moderate or low quality. Interventions included home visitation, educational modules, counseling, and cash transfer programs and occurred primarily in community obstetrician and gynecologist clinics, hospitals, or in participants' homes. Most interventions focused on reducing the revictimization of IPV (n = 38), improving survivor knowledge or acceptance of violence, knowledge of community resources, and actions to reduce violence (n = 28), and improving maternal mental health outcomes (n = 26). Few studies evaluated the effect of perinatal IPV interventions on obstetrical, neonatal, or child health outcomes.

Authors' Conclusion(s): The majority of intervention studies for perinatal IPV focus on reducing revictimization and improving mental health outcomes, very few included obstetrical, neonatal, and other physical health outcomes. Future interventions should place a larger emphasis on targeting maternal and neonatal outcomes to have the largest possible impact on the lives and families of IPV survivors and their infants.

Campbell Systematic Reviews, Volume 20, Issue 3, September 2024

Motherhood and Domestic Violence: A Longitudinal Study Using Population Wide Administrative Data  

By Sanna Bergvall, Núria Rodríguez-Planas:

Most empirical studies indicate that becoming a mother is an augmenting factor for the perpetration of intimate partner violence (IPV). Using rich population-wide hospital records data from Sweden, we conduct a stacked DiD analysis comparing the paths of women two years before and after the birth of their first child with same-age women who are several quarters older when giving birth to their first child and find that, in contrast to the consensus view, violence sharply decreases with pregnancy and motherhood. This decline has both a short-term and longer-term component, with the temporary decline in IPV covering most of the pregnancy until the child is 6 months old, mimicking a temporary decrease in hospital visits for alcohol abuse by the children's fathers. The more persistent decline is driven by women who leave the relationship after the birth of the child. Our evidence is not supportive of alternative mechanisms including suspicious hospitalizations, an overall reduction in hospital visits or selection in in seeking medical care, mothers’ added value as the main nurturer, or mothers’ drop in relative earnings within the household. Our findings suggest the need to push for public health awareness campaigns underscoring the risk of victimization associated with substance abuse and to also provide women with more support to identify and leave a violent relationship

Bonn: Institute of Labor Economics - IZA, 2024

Understanding Intimate Partner Violence: Why Coercive Control Requires a Social and Systemic Entrapment Framework 

By Julia Tolmie, Rachel Smith, and Denise Wilson

How intimate partner violence (IPV) is conceptualized affects what we see when we look at situations involving IPV and what we think the solutions to the problem of IPV are—either in individual cases or in the development of broader legal and policy responses. In this article, it is suggested that while conceptualizing IPV as coercive control is an improvement over previous understandings, it does not go far enough. Coercive control must be located within a broader conceptualization of IPV as a form of social and systemic entrapment if it is not to operate in a harmful manner for victim-survivors.

Violence Against WomenVolume 30, Issue 1, January 2024, Pages 54-74


Cybersecuring the Pipeline

By Ido Kilovaty

The Colonial Pipeline ransomware attack, which shut down gas supply to the entire East Coast back in May 2021, has sparked debate as to the regulation of the pipeline’s cybersecurity. After ten years of inaction on the matter, the Transportation Security Administration (TSA) has issued two mandatory directives on pipeline cybersecurity. This Article delves into the propriety of the TSA as a pipeline security regulator, as well as the incomplete and ineffective approach currently laid out in the TSA’s pipeline cybersecurity directives. This Article argues that there may be other agencies more suitable for the task, such as the Federal Energy Regulatory Commission, acting under the auspices of the Department of Energy. It also provides specific recommendations as to the substance of any prospective pipeline cybersecurity regulation, such as the creation of more open-ended and flexible cybersecurity objectives as opposed to the current approach of prescriptive standards.

Houston Law Review, Vol. 60, 2023, Kilovaty, Ido, Cybersecuring the Pipeline (March 29, 2022). Houston Law Review, Vol. 60, 2023,

Hacking Generative AI

By Ido Kilovaty

Generative AI platforms, like ChatGPT, hold great promise in enhancing human creativity, productivity, and efficiency. However, generative AI platforms are prone to manipulation. Specifically, they are susceptible to a new type of attack called “prompt injection.” In prompt injection, attackers carefully craft their input prompt to manipulate AI into generating harmful, dangerous, or illegal content as output. Examples of such outputs include instructions on how to build an improvised bomb, how to make meth, how to hotwire a car, and more. Researchers have also been able to make ChatGPT generate malicious code. This article asks a basic question: do prompt injection attacks violate computer crime law, mainly the Computer Fraud and Abuse Act? This article argues that they do. Prompt injection attacks lead AI to disregard its own hard-coded content generation restrictions, which allows the attacker to access portions of the AI that are beyond what the system’s developers authorized. Therefore, this constitutes the criminal offense of accessing a computer in excess of authorization. Although prompt injection attacks could run afoul of the Computer Fraud and Abuse Act, this article offers ways to distinguish serious acts of AI manipulation from less serious ones, so that prosecution would only focus on a limited set of harmful and dangerous prompt injections.

Loyola of Los Angeles Law Review, Vol. 58, 2025, Kilovaty, Ido, Hacking Generative AI (March 1, 2024). Loyola of Los Angeles Law Review, Vol. 58, 2025,