Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Social Sciences
Carjacking: Scope, Structure, Process, and Prevention

By Bruce A. Jacobs, and Michael Cherbonneau

Carjacking is a violent crime with a broad motivational landscape related to the unique opportunities that a motor vehicle, as the item targeted, makes available to offenders once it is stolen. Although carjacking is technically a form of robbery, carjacking is a hybrid offense because it draws from elements of both regular robbery and motor vehicle theft. Nuanced in its etiology and expression, carjacking boasts a structure and process that require offenders to navigate multiple challenges under considerable time pressure and uncertainty. The fact that carjacking is so often opportunistic yet simultaneously requires a fair amount of calculation makes the offense even more subtle in its complexity. The purpose of this review is to examine these nuances through the lens of official data and existing empirical research. Nascent but growing, this research provides insight into the scope of the problem, the method and manner of the crime's commission, and the challenges of curbing a clear urban menace.

Annual Review of Criminology, v. 6. 2023, 24pg

Homicide among Indigenous females in North Carolina: a comparison of publicly generated data and violent death reporting system

By Muhammad Hudhud, Scott Proescholdbell, Tammy Norwood, Crystal Cavalier-Keck, Ronny A Bel

Like other minoritized populations, American Indian/Alaska Native (AI/AN) females experience disparate morbidity and mortality outcomes to that of the general US population. This study identified discrepancies in reporting of AI/AN female decedents between the North Carolina Violent Death Reporting System (NC-VDRS) and an online, user-generated database. Female AI/AN decedent data of all ages were collected from the NC-VDRS and compared against that of the publicly available North Carolina Missing and Murdered Indigenous Women (MMIW NC) database for the study period, 2004–2019. Twenty-four of the 72 cases matched between data systems (33.3%). Substantive differences between the NC-VDRS and the MMIW NC database were found. Future efforts should be directed towards supporting Indigenous communities with the comprehensive data the NC-VDRS can provide. This paper highlights statewide public health systems like the NC-VDRS supporting community efforts to understand, advocate for, and disseminate information on MMIW.

Forensic Sciences Research, Volume 9, Issue 1. March 2024, 3pg

Identifying human trafficking indicators in the UK online sex market

By Luca Giommoni, Ruth Ikwu

   This study identifies the presence of human trafficking indicators in a UK-based sample of sex workers who advertise their services online. To this end, we devel oped a crawling and scraping software that enabled the collection of information from 17, 362 advertisements for female sex workers posted on the largest dedicated platform for sex work services in the UK. We then established a set of 10 indicators of human trafficking and a transparent and replicable methodology through which to detect their presence in our sample. Most of the advertisements (58.3%) contained only one indicator, while 3,694 of the advertisements (21.3%) presented 2 indicators of human trafficking. Only 1.7% of the advertisements reported three or more indica tors, while there were no advertisements that featured more than four. 3, 255 adver tisements (19.0%) did not contain any indicators of human trafficking. Based on this analysis, we propose that this approach constitutes an effective screening process for quickly identifying suspicious cases, which can then be examined by more compre hensive and accurate tools to identify if human trafficking is occurring. We conclude by calling for more empirical research into human trafficking indicators

Trends in Organized Crime. 2024, 14pg

Global Cybercrime: Federal Agency Efforts to Address International Partners' Capacity to Combat Crime

By U.S. Government Accountability Office

   The U.S. and its global partners are experiencing the effects of a massive cybercrime wave, which is growing in frequency and scale. In 2021, the Federal Bureau of Investigation received a record number of cybercrime complaints, over 840,000, with potential losses exceeding $6.9 billion. Further, in 2022, the intelligence community noted an increase in ransomware attacks by transnational criminals, which threaten to cause disruptions of critical services worldwide. GAO was asked to review federal efforts to build the capacity of allies and partner nations to combat cybercrime. This report’s specific objectives were to (1) describe challenges in building global capacity to combat cybercrime, and (2) determine actions selected federal agencies are taking to build foreign nations’ capacity to combat cybercrime and the extent to which they are evaluating the effectiveness of their efforts. GAO interviewed agency officials and convened a panel of experts representing entities focused on capacity building to combat global cybercrime. GAO also analyzed documentation from State, DOJ, and DHS, which provide the majority of U.S. capacity building assistance. What GAO Recommends GAO is making one recommendation to State to conduct a comprehensive evaluation of capacity building efforts to counter cybercrime. State concurred with the recommendation. 

 Washington, DC: GAO, 2023. 49p.

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance.

By National Academies of Sciences, Engineering, and Medicine; Division on Engineering and Physical Sciences; etc

Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforcement investigations to identifying potential security threats at large venues. However, advances in this technology have outpaced laws and regulations, raising significant concerns related to equity, privacy, and civil liberties.

This report explores the current capabilities, future possibilities, and necessary governance for facial recognition technology. Facial Recognition Technology discusses legal, societal, and ethical implications of the technology, and recommends ways that federal agencies and others developing and deploying the technology can mitigate potential harms and enact more comprehensive safeguards.

Washington, DC: National Academies Press, 2024.

A Longitudinal Study on Online Sexual Engagement, Victimization, and Psychosocial Well-Being

By: Felix Reer, Ruth Wendt, and Thorsten Quandt

Several cross-sectional studies have shown that online sexual engagement (OSE) in the form of sexting or sexy self-presentation on social media is associated with an increased risk of experiencing negative consequences, such as online sexual victimization (OSV) or lower levels of psychosocial well-being. However, representative and longitudinal studies are scarce. The current study follows three research goals: (1) examining the prevalence of OSE and OSV among a random-quota sample of 1,019 German Internet users aged 14–64 years, (2) examining gender and age-related differences in OSE and OSV, and (3) examining the longitudinal relationships between OSE, OSV, and psychosocial well-being over a period of 1 year. Our results indicate that OSE and OSV are relatively widespread: 17.7% of the participants had already experienced OSV, 25.3% indicated that they had presented themselves online in a sexualized manner at least once in the past 2 months, and 22.7% showed a certain willingness to engage in sexting. We found higher rates among the younger participants. However, to a certain degree, older individuals were also affected. Male participants showed higher sexting willingness and more often presented themselves in a sexualized manner than females, whereas only small differences related to OSV were found. Concerning relationships with psychosocial well-being, our cross-sectional results showed that OSE, OSV, and mental problems are intercorrelated. Furthermore, we detected a significant long-term relationship between higher sexting willingness at time 1 and more victimization experienced 1 year later, whereas no significant longitudinal associations with lower levels of psychosocial well-being were identified.

Front. Psychol., 07 December 2021

Respectable White Ladies, Wayward Girls, and Telephone Thieves in Miami’s “Case of the Clinking Brassieres”

By Vivien Miller 

This essay uses the 1950 “case of the clinking brassieres” to explore female theft in Miami at mid-century and the ways in which gender, race, class, respectability, and youth offered protections and shaped treatment within Florida’s criminal justice system. It focuses on the illegal activities of three female telephone employees, their criminal prosecution, and post-conviction relief. These seemingly respectable coin thieves challenged a familiar image of theft as a lower-class crime associated with poverty and economic need, while their blonde hair and white skin (and an idealization of the meanings of white beauty standards), complicated public attitudes in a period when “true” or serious criminals were racketeers and organised crime operatives.

European Social Science History Conference, 2013. 39p.

Countering Counterfeits: The Real Threat of Fake Products How Fake Products Harm Manufacturers, Consumers and Public Health—and How to Solve This Problem 

By The National Association of Manufacturers

Amid an unprecedented global health crisis, manufacturers have stepped up and taken the lead, working together and with national, state and local governments to fight the spread of COVID-19. Manufacturers deliver day-to-day necessities, lifesaving medical innovations and products that improve people’s lives in countless ways. While the pandemic has demonstrated anew the importance of American innovation and ingenuity, it has also revealed a serious threat: counterfeit products that put lives and livelihoods at risk. Counterfeiting is not a new problem; it has harmed manufacturers, American workers and consumers for years. But the problem is getting worse, and the COVID-19 pandemic has shown just how dangerous inaction can be. As part of the nation’s critical response effort, manufacturers have been supplying health care workers and other Americans on the front lines of this crisis with vital goods, including personal protective equipment, hospital beds, ventilators, hand sanitizers, cleaning supplies and other critical health care and safety products. But while manufacturing men and women work long hours to ramp up production of desperately needed products to fight the spread of this deadly illness, counterfeiters have exploited the crisis to peddle fake tests, dangerous vaccines and ineffective protective gear. These counterfeits are harming American citizens and hindering manufacturers’ efforts to protect their workers and communities. The prevalence of counterfeits in the COVID-19 response has brought new urgency to this long-simmering issue. So the National Association of Manufacturers is leading the charge against fake and counterfeit goods, bringing together diverse stakeholders and driving innovative policy solutions to address these issues once and for all and to ensure the long-term success of our sector and the safety and security of the people who rely on our products. 

Washington, DC: National Association of Manufacturers, 2020.  21p.

 The Impact of Organized Retail and Product Theft in the United States

By John Dunham & Associates

The Retail Industry Leaders Association (RILA) is the US trade association for retailers that have earned leadership status by virtue of their sales volume, innovation, or aspiration. The Buy Safe America Coalition (BSA) represents a diverse group of responsible retailers, consumer groups, manufacturers, intellectual property advocates and law enforcement officials who support efforts at all levels of government to protect consumers and communities from the sale of counterfeit and stolen goods. One important issue facing US retailers is the growth in the availability and sales of illicit products, both from counterfeit imports and from products stolen from legitimate retailers. These products are increasingly sold online through third-party marketplaces. RILA and BSA asked John Dunham & Associates (JDA) to examine the data around these illicit sales to determine how they impact the US economy, federal tax revenues, and criminal activity. This is the second in a series of papers examining the issue of organized retail crime (ORC), and its effect on the United States economy. This analysis will focus on product theft from brick-and- mortar retailers and the rise of organized theft operations that fence illegally obtained goods to consumers, increasingly online. While this paper focuses solely on those goods stolen from retail locations, there is a growing problem with consumer goods being stolen from containers and trucks as the supply chain has backed up in recent months. For the purpose of this analysis, cargo theft was not included. According to the analysis: • As much as $68.9 billion worth of products were stolen from retailers in 2019. This represents about 1.5 percent of total retail sales. • Law enforcement and retail asset protection officials have found that the availability of anonymous online marketplaces has provided an easy way to sell stolen goods, and that the growth of these marketplaces coincides with a recent surge in organized retail crime that puts both employees and customers in harm’s way. • Academic research has suggested that most retail theft represent crimes of opportunity. In other words, people steal when it is easy to do so. Other causes include poor economic conditions, and dissatisfaction among workers. However, professionals in the field identify the availability of anonymous on-line marketplaces as ways to easily fence goods, and prosecutorial changes as being major factors contributing to the growth in ORC. • The growth in on-line marketplaces is highly correlated (61 percent) to the number of shoplifting events reported each year. • In addition, those retail categories most subject to shoplifting activities are also the ones most sought after through on-line marketplaces. • Nearly 67 percent of asset protection managers at leading retailers surveyed report a moderate to considerable increase in organized retail crime, while 80 percent believe it will only get worse in the future.  The economic impact of retail crime is profound. Retailers face increased costs for lost product, security, and labor, which lead to higher prices for consumers and ultimately, lower sales. Lower sales translate to fewer jobs throughout the economy. The result is $125.7 billion in lost economic activity and 658,375 fewer jobs, paying almost $39.3 billion in wages and benefits to workers. • Retail theft is not a problem just in major metropolitan areas, it is pervasive across America. In fact, one factor that is associated with lower levels of retail theft is the density of retail locations. • The impact of theft is felt through higher prices, and this impact is more acutely felt by low- and middle-income families. • It is estimated that retail theft costs federal and state governments nearly $15 billion in personal and business tax revenues, not including the lost sales taxes.

Washington DC: Retail Industry Leaders Association (RILA) ;  Washington, DC:  Buy Safe American Coalition, 75p.

The Counterfeit Silk Road - Impact of Counterfeit Consumer Products Smuggled into the United States

By John Dunham & Associate

  The Buy Safe America Coalition represents a diverse group of responsible retailers, consumer groups, manufacturers, intellectual property advocates and law enforcement officials who support efforts at all levels of government to protect consumers and communities from the sale of counterfeit and stolen goods. One important issue facing US businesses is the massive growth in the availability and sales of illicit products, both from counterfeit imports — increasingly from China — and from products stolen from legitimate retailers and sold through online marketplaces, where the anonymity of a screenname has made it easier and more profitable to fence counterfeit and stolen goods. The Coalition asked John Dunham & Associates (JDA) to examine the data around these illicit sales to determine how they impact the US economy, federal tax revenues, and criminal activity. This is the first of a series of papers examining the issue of counterfeit and stolen goods and its effect on the United States economy. This analysis will focus on the importation of illicit products, notably counterfeits that violate producers’ intellectual property rights. Future analysis will examine the effects of domestic smuggling, the resale of stolen goods, and the effects of contraband on overall criminal activity. According to the analysis: • A large share of contraband items are delivered to US consumers by mail or by express consignment. These transactions account for over 60.8 percent of all seizures by the US customs service and over 90 percent of intellectual property rights (IPR) seizures. The growth in these types of shipments has increased along with the use of online marketplaces. Amazon, for instance, now derives more than 75 percent of their ecommerce revenue from marketplace sales. • In effect, as companies like the Chinese ecommerce marketplace Alibaba and the Amazon marketplace, have linked more consumers to more shippers, many companies producing illegitimate products have gained access to unwitting consumers in America. • The bulk of counterfeit products to the US come from China and its dependent territories, accounting for over 90.6 percent of all cargo with IPR violations. Of the $1.23 billion in total IPR violations intercepted, $1.12 billion was from China. • Examining just those data where CBP can provide an HS code, in some cases, the amount of contraband cargo is nearly equal to the entire import base. For example, imports of certain sweaters, jumpsuits and toys from China are almost 100 percent contraband, as are large amounts of handbags, jewelry and belts. • While there is substantial academic literature on the smuggling of narcotics, people and tobacco, there is very little written on counterfeit products. Using a very conservative model it is estimated that $44.3 billion in additional illicit cargo is escaping detection. • These lost sales alone mean that over 39,860 jobs in wholesaling and nearly 283,400 retail jobs are lost due to the impact of counterfeit goods skirting normal trade channels. All told, the sale of counterfeit items is expected to cost the wholesale and retail sectors of the US economy nearly 653,450 full-time equivalent jobs that pay over $33.6 billion in wages and benefits to US workers. • It is estimated that the smuggling of counterfeit goods costs the US government nearly $7.2 billion in personal and business tax revenues alone. • This analysis is based on the current level of CBP intercepts of illicit cargo. It is likely that the number of illegal imports is much larger than even estimated here.  

Washington, DC: Buy Safe America Coalition, 2021. 25p.

The Online Gaming Ecosystem: Assessing Digital Socialisation, Extremism Risks and Harms Mitigation Efforts

By Galen Englund and Jessica White

This report provides a review of the research on the exploitation of gaming and gaming‑adjacent platforms by violent extremists and the policies seeking to mitigate the impact of that exploitation. There is increasing interest in the nexus of online gaming and (violent) extremism. This report builds on the work of the Extremism and Gaming Research Network (EGRN) to provide a primer for those new to this space and an updated state of play of the cutting‑edge research taking place among members of the network and beyond. The report is divided into three sections. First, it lays out the online gaming ecosystem. The report identifies gamers, the unique individual and community identity formations that can happen in these spaces and the multifaceted environment in which this takes place, including games, gaming‑adjacent spaces and beyond. Second, it builds upon and enhances a typology of potential harms in the online gaming ecosystem. This typology allows clarification of the different ways in which extremism can both spread through these spaces and how extremists can specifically exploit these spaces and communities. Third, it provides an overview of some of the efforts that are currently ongoing to mitigate these potential harms. This includes efforts in the tech industry to reinforce policies and moderation efforts, by game designers to address potential challenges at an early stage and by practitioners who use online gaming engagement or gamification to prevent and counter violent extremism effectively. Finally, the report concludes by looking to the future of this exponentially expanding space. It offers some recommendations for research, policy and practice to better understand and address the threat of extremism within online gaming to protect and enhance online gaming as a positive engagement space.

London: Global Network on Extremism & Technology, 2023. 36p.

Cults and Online Violent Extremism

By Suzanne Newcombe, Sarah Harvey, Jane Cooper, Ruby Forrester, Jo Banks and Shanon Shah

The word ‘cultic’ is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a ‘cult following’. However, the use of the words ‘cult’ or ‘cultic’ is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: ‘Cultic’ Religious Groups, ‘Online Cultic Milieus’ and ‘Cultic Fandoms’. This is not an exhaustive description of online activity that has been termed ‘cultic’ in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of ‘cults’ and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual. It is important to understand that there are a range of ways individuals interact with these cultic online environments that may or may not represent warning signs or pathways into violent extremism. A holistic understanding of both the nature of the cultic online milieu and an individual’s engagement with that environment is warranted before making assumptions about the nature of any individual’s engagement.

London: Global Network on Extremism and Technology (GNET), July 2023.

Offline versus online radicalization: Which is the bigger threat?  Tracing Outcomes of 439 Jihadist Terrorists Between 2014–2021 in 8 Western Countries

By Nafees Hamid and Cristina Ariza

Question: Are those radicalised offline or online more of a threat? Which group is harder to detect, more successful in completing attacks, and more lethal when they do so? Is the pattern different for youth versus older perpetrators and for men versus women? This report investigates these questions. Database: We created a database containing 439 perpetrators involved in 245 attacks between 1 January 2014 and 1 January 2021. It includes every publicly known completed attack and an extensive sampling of thwarted attacks. Attacks were all jihadist‑linked in eight Western countries: Australia, Austria, Belgium, France, Germany, Spain, the United Kingdom and the United States. Type of radicalisation: In our database, radicalisation primarily happens offline; over half the individuals in our database had been radicalised via offline networks. Success and lethality: Individuals who were radicalised offline were three times more likely than individuals radicalised online to complete an attack successfully. Those radicalised offline are 18 times more lethal than individuals in the online category. Those radicalised online are almost eight times more likely to fail than to succeed. Group attacks: Individuals who were radicalised offline are almost three times more likely to attack or plot in groups than individuals radicalised online. Success of group attacks: While groups were more likely to be thwarted by the police than to succeed (regardless of how individuals had been radicalised), successful groups of people radicalised offline were more lethal than their lone actor counterparts (15%). Family and friends: Some 87% of those with radicalised friends and 74% with radicalised relatives plotted or attacked together. Foreign fighters: Foreign terrorist fighters (FTFs), who were mostly radicalised offline, have the same success rate as non‑FTFs. But success rate increases if they have spent more than a year in a terrorist training location. Age: Online radicalisation is on the rise for young people (born from the 2000s onwards), although most individuals, including young people, are still radicalised offline. Gender: Women appear to be more likely to have been radicalised online. Bottom line: Those radicalised offline are greater in number, more successful in completing attacks and more deadly than those radicalised online.  

London: International Centre for the Study of Radicalisation, King’s College London. 2022. 40p.

What the research evidence tells us about coercive control victimisation

By Jasmine B. MacDonald, Melissa Willoughby, Pragya Gartoulla, Eliza Cotton, Evita March, Kristel Alla, Cat Strawa

Overview - Coercive control is the ongoing and repetitive use of behaviours or strategies (including physical and non-physical violence) to control a current or ex intimate partner (i.e. victim-survivor) and make them feel inferior to, and dependent on, the perpetrator (Australia’s National Research Organisation for Women’s Safety [ANROWS], 2021). Coercive control is a relatively new area to policy, practice and research and the research evidence is still emerging. However, AIFS’ consultations with key stakeholders in the child and family sector identified coercive control as a key topic of interest for policy makers and practitioners and that there is a desire for a synthesis of current evidence. This paper synthesises the findings of a rapid literature review to describe what we know about how common coercive control victimisation is, as well as risk factors and impacts of coercive control victimisation. A victim-survivor is someone who has experienced coercive control victimisation (i.e. been the target of coercive control behaviours by a current or ex intimate partner). The term victim-survivor is used to acknowledge ‘the ongoing effects and harm caused by abuse and violence as well as honouring the strength and resilience of people with lived experience of family violence’ (Victorian Government, 2022). The fndings of the rapid literature review are presented in 3 chapters: How common is coercive control victimisation? Risk factors associated with coercive control victimisation Impacts associated with coercive control victimisation. The key findings for each of these results sections are summarised in the subsections below. Please refer to the full chapter for more detail, including the evidence synthesis of relevant research studies and implications for practice, research and policy. Key messages Quality of coercive control victimisation research The studies sampled in this review provide important foundational insights about coercive control victimisation but had some limitations. These limitations were related to the relatively early stage of research on coercive control victimisation and the practical barriers associated with research in a complex area of human experience. Based on our review, we made the following observations about the state of evidence on coercive control victimisation in Australia: ƒ There is a need for research specifc to the Australian context. Only a small proportion of the sampled studies (3 out of 13; 23%) explored Australian experiences. ƒ We currently know little about the unique experiences of: – Aboriginal and/or Torres Strait Islander peoples – people with disability – LGBTQIA+ communities – culturally and linguistically diverse (CALD) communities – people in older age groups (65+ years) – children and young people where there is coercive control between their parents – intersectional experiences across more than one of the above. ƒ There is debate among researchers and experts about what exactly coercive control victimisation is and how it should be conceptualised: Some studies emphasised the gendered nature of coercive control and others did not. – Some studies have not used a measure of coercive control but rather a measure of domestic and family violence (DFV), sometimes from a previous study. In such instances, coercive control victimisation is often considered to be synonymous with the experience of psychological or emotional abuse behaviours as distinct from experiences of physical or sexual violence in the DFV measures. – Others, such as Stark and colleagues (Stark, 2007; Stark & Hester, 2019) and ANROWS (2021), conceptualise coercive control as the context in which intimate partner violence (IPV) occurs, meaning that physical and sexual violence are considered behaviours to enact coercive control (when not occurring in isolated incidence-based abuse). – Most studies (70%) used customised measurements of coercive control victimisation (i.e. measures constructed by the authors for the purpose of the study). Standardised and psychometrically validated measures were used by only 4 of the 13 sampled studies. ƒ Research design diferences between studies make it challenging to: – distinguish between IPV characterised by a coercive control pattern and that which is not – identify coercive control in practice – inform prevention and intervention – know which risk factors and impacts are most robust and deserving of further investigation. ƒ Most studies used a cross-sectional survey method for data collection. These studies cannot demonstrate changes for specific individuals over time or indicate coercive control victimization causing a change in outcomes such as mental health within the sampled participants. A longitudinal research design is required to demonstrate such changes and potential causation. ƒ Studies were also characterized by: – self-report data – large differences in sample sizes – an absence of demographic and other relevant social variables in analyses – a broad range of risk factors and impact measures, with little consistency of measures or replication of findings – a tendency to focus on individual-level factors associated with victimization, without equal consideration of broader institutional or societal levels.

Southbank VIC 3006 Australia Australian Institute of Family Studies, 2024 42p.

When Men Murder Women: An Analysis of 2020 Homicide Data

By Violence Policy Center

 Intimate partner violence against women is all too common and takes many forms. The most serious is homicide by an intimate partner. Guns can easily turn domestic violence into domestic homicide. One federal study on homicide among intimate partners found that female intimate partners are more likely to be murdered with a firearm than all other means combined, concluding that “the figures demonstrate the importance of reducing access to firearms in households affected by IPV [intimate partner violence].” Guns are also often used in non-fatal domestic violence. A study by Harvard School of Public Health researchers analyzed gun use at home and concluded that “hostile gun displays against family members may be more common than gun use in self-defense, and that hostile gun displays are often acts of domestic violence directed against women.” The U.S. Department of Justice has found that women are far more likely to be the victims of violent crimes committed by intimate partners than men, especially when a weapon is involved. Moreover, women are much more likely to be victimized at home than in any other place.5 A woman must consider the risks of having a gun in her home, whether she is in a domestic violence situation or not. While two thirds of women who own guns acquired them “primarily for protection against crime,” the results of a California analysis show that “purchasing a handgun provides no protection against homicide among women and is associated with an increase in their risk for intimate partner homicide.” A 2003 study about the risks of firearms in the home found that females living with a gun in the home were nearly three times more likely to be murdered than females with no gun in the home. Finally, another study reports, women who were murdered were more likely, not less likely, to have purchased a handgun in the three years prior to their deaths, again invalidating the idea that a handgun has a protective effect against homicide. While this study does not focus solely on domestic violence homicide or guns, it provides a stark reminder that domestic violence and guns make a deadly combination. According to reports submitted to the Federal Bureau of Investigation (FBI), firearms are rarely used to kill criminals or stop crimes.9 Instead, they are all too often used to inflict harm on the very people they were intended to protect.

Washington, DC: Violence Policy Center. 2022, 27pg

Counterfeits on Darknet Markets: A measurement between Jan-2014 and Sep-2015

By: Felix Soldner, Bennett Kleinberg, and Shane D Johnson

Counterfeits harm consumers, governments, and intellectual property holders. They accounted for 3.3% of worldwide trades in 2016, having an estimated value of $509 billion in the same year. While estimations are mostly based on border seizures, we examined openly labeled counterfeits on darknet markets, which allowed us to gather and analyze information from a different perspective. Here, we analyzed data from 11 darknet markets for the period Jan-2014 and Sep-2015. The findings suggest that darknet markets harbor similar counterfeit product types as found in seizures but that the share of watches is higher and lower for electronics, clothes, shoes, and Tobacco on darknet markets. Also, darknet market counterfeits seem to have similar shipping origins as seized goods, with some exceptions, such as a relatively high share (5%) of dark market counterfeits originating from the US. Lastly, counterfeits on dark markets tend to have a relatively low price and sales volume. However, based on preliminary estimations, the original products on the surface web seem to be worth a multiple of the prices of the counterfeit counterparts on darknet markets. Gathering insights about counterfeits from darknet markets can be valuable for businesses and authorities and be cost-effective compared to border seizures. Thus, monitoring darknet markets can help us understand the counterfeit landscape better.

Crime Science (2023) 12:18

The overlap between child sexual abuse live streaming, contact abuse and other forms of child exploitation

By Coen Teunissen and Sarah Napier

We analysed the chat logs of seven Australia-based men who had committed 145 child sexual abuse (CSA) live streaming offences, to examine the overlap between this offending, contact sexual offending and engagement with child sexual abuse material (CSAM).

Four CSA live streaming offenders attempted to travel to offend against victims in person, in that they discussed travelling or actually booked flights in order to meet these children. Offenders also requested or received images and videos of victims they had viewed over live stream, and recorded live streams to produce CSAM.

Travelling to offend against children, use of CSAM and CSA live streaming appear to be interrelated and should be considered by law enforcement as potential risk factors for one another. Further, detection and removal of new CSAM, and scanning of live streams for abusive content, should be a priority for all electronic service providers.

Trends & issues in crime and criminal justice no. 671. Canberra: Australian Institute of Criminology. 2023. 16p.

Understanding fraudulent returns and mitigation strategies in multichannel retailing

By Danni Zhang, Regina Frei, P.K. Senyo, Steffen Bayer, Enrico Gerding, Gary Wills and Adrian Beck

The growth of online retailing has exceeded expectations over the last few years. This has resulted in high product return rates, which retailers are struggling with due to complex and costly returns processing, logistics, and financial implications. Additionally, online returns come with increased opportunities for returns fraud. During the pandemic, new types of returns fraud have emerged and returns fraud rates have increased across all channels. Based on a series of semi-structured interviews with retailers and retail experts, we investigate factors that enable fraudulent returns from consumers' and retailers’ perspectives and outline strategies for retailers to combat product returns fraud in a multichannel environment, leading to a framework for retail fraud. We contribute critical insights to research and practices on understanding and addressing a growing problem that has economic, social and environmental implications.

Journal of retailing and consumer services, Vol.70, 2023. 103145

VIIOLENCE IN AMERICA VOL.2. PROTEST, REBELLION, REFORM.

MAY CONTAIN MARKUP

EDIYED BY TED ROBERT GURR

VIIOLENCE IN AMERICA VOL.2. PROTEST, REBELLION, REFORM dives deep into the complex tapestry of societal upheaval within the United States. This compelling volume explores the multifaceted nature of violence in various forms, from protests to rebellions, and the calls for reform that echo through the nation. Through a collection of thought-provoking essays and analytical pieces, this book sheds light on the struggles, triumphs, and challenges that define contemporary American society. A must-read for those seeking a comprehensive understanding of the current landscape of dissent and transformation in the United States.

NEWBURY PARK. SAGE. 1989. 372p.