Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts in Social Sciences
Ending Violence Against Women and Girls in Digital Contexts: A Blueprint to Translate Multilateral Commitments into Domestic Action

By Lisa Sharland and Ilhan Dahir  

   Women are impacted by violence in digital contexts in a variety of ways. While technology and the internet have catalyzed opportunities for men and women to engage, communicate, and further their human rights, digital space also poses a gendered risk, as abuses offline are mirrored and replicated online. Technology facilitated violence disproportionately affects women and can be used to perpetuate different types of inequality. Member states have reached agreement through multiple UN processes on the importance of enacting legislation, developing policies, creating monitoring and accountability mechanisms, and providing effective remedies for victims and survivors of violence in digital contexts. However, efforts to advance domestic implementation have been slow. Building on previous research by the Stimson Center, this paper provides a blueprint that offers ten overarching strategies for governments to consider in the development of more effective and coherent domestic policy on ending violence against women and girls (VAWG) in digital contexts. The blueprint also offers a framework for civil society to hold governments to account for the commitments they have made to end VAWG in digital contexts  

Washington, DC: Stimson Center. 2023, 44pg

Research Report - Rapid Evidence Review: Violence, abuse, neglect and exploitation of people with disability

By Joel Koh, Vanessa Rose, Gayatri Kembhavi-Tam, Rebecca FeatherstonAron Shlonsky

The Royal Commission into Violence, Abuse, Neglect and Exploitation of People with Disability was established in April 2019 in response to community concern about widespread reports of violence against, and neglect, abuse and exploitation1 of, people with disability. This rapid review – undertaken by the Centre for Evidence and Implementation in partnership with Monash University – reviews evidence that describes experiences of violence, abuse, neglect and exploitation, with the aim of preventing this from occurring, and better supporting people with disability. We had two key review questions: • What are the risk and protective factors associated with violence, abuse, neglect and exploitation of people with disabilities from birth to 65 years? • What is the nature of violence, abuse, neglect and exploitation experienced by people with disabilities from birth to 65 years? The scope of the review was limited to avoid overlap with the Aged Care Royal Commission and to reflect contemporary disability policy and legislation within four Commonwealth Western Industrialised countries with similar economic, political and legal systems. We used a rigorous and systematic process to identify 168 papers in the peer reviewed literature: 60 publications focused on risk and protective factors and 109 publications focused on the nature and experience of violence against, abuse, neglect and exploitation of people with disability (and one publication focused on both of these topics). Evidence from studies focused on risk and protect factors related to violence against, abuse, neglect and exploitation of people with disability suggest: • Having a disability increases the risk of experiencing violence, abuse, and neglect. The overarching finding across almost all studies was that people with disabilities were more likely to have experienced all types of violence, abuse, neglect and exploitation when compared to people without disabilities. • Being a female with a disability increases the risk of experiencing violence and abuse. This includes studies focused on violence, violent crime or victimisation, intimate partner or gender-based violence, sexual abuse and physical abuse. • The reported risk factors are limited, primarily focussed at the individual level, and static. There was a focus more on individual and static (usually unchanging) risk factors, such as disability status or gender and little attention to different types disability, groups or intersectionality.

Royal Commission into Violence, Abuse, Neglect and Exploitation of People with a Disability. 2021, 81pg

A life course approach to determining the prevalence and impact of sexual violence in Australia

By Natalie Townsend

The Australian Government Department of Social Services (2019, p. 60) defines sexual violence as sexual actions without consent, which may include coercion, physical force, rape, sexual assault with implements, being forced to watch or engage in pornography, enforced prostitution or being made to have sex with other people. While there is a growing body of international evidence on sexual violence, its prevalence and impact has not been extensively examined in the Australian context. The existing evidence base is largely limited to data sources that are likely to underestimate the prevalence of sexual violence or to apply only to discrete groups of women (e.g. clinical samples). Further, while international and national estimates of sexual violence prevalence are available, these rarely capture experiences and outcomes across the life span. The Australian Longitudinal Study on Women’s Health (ALSWH) has collected sexual violence data since its inception in 1996 and offers an ideal opportunity to examine sexual violence over the life span. The ALSWH has captured a broad range of data on women’s health, which are crucial for understanding the economic, social, physical and mental health trajectories of women who have experienced sexual violence. This report was developed in consultation with ANROWS to address the limitations of the existing evidence by utilising ALSWH data. Aims The purpose of this report was to assess the prevalence of sexual violence over the life course and the impacts of experiencing sexual violence on health and wellbeing among Australian women using national, longitudinal data. The research had the following specific aims: 1. Determine the prevalence of sexual violence across the life course, including sexual violence experienced in childhood and adulthood, perpetrated both within an intimate relationship and outside of such a relationship. 2. Determine the role of sexual violence during childhood as a risk factor for experiences of multiple forms of violence later in life. 3. Identify the impact of sexual violence on socio-economic factors over time, such as education, paid employment and financial stress. 4. Determine the nature of associations between sexual violence experienced by women at different life stages and subsequent health behaviours. 5. Assess the impact of sexual violence on women’s physical and mental health. 6. Measure health service use in relation to sexual violence, including costs of selected health services and satisfaction with general practitioner services. 7. Identify factors associated with the general health and wellbeing of women who have experienced sexual violence.  

Sydney: Australia’s National Research Organisation for Women’s Safety Limited (ANROWS). 2022, 95pg

The Sex Offender Housing Dilemma: Community Activism, Safety, and Social Justice

By Monica Williams

The controversy surrounding community responses to housing for sexually violent predators When a South Carolina couple killed a registered sex offender and his wife after they moved into their neighborhood in 2013, the story exposed an extreme and relatively rare instance of violence against sex offenders. While media accounts would have us believe that vigilantes across the country lie in wait for predators who move into their neighborhoods, responses to sex offenders more often involve collective campaigns that direct outrage toward political and criminal justice systems. No community wants a sex offender in its midst, but instead of vigilantism, Monica Williams argues, citizens often leverage moral, political, and/or legal authority to keep these offenders out of local neighborhoods. Her book, the culmination of four years of research, 70 in-depth interviews, participant observations, and studies of numerous media sources, reveals the origins and characteristics of community responses to sexually violent predators (SVP) in the U.S. Specifically, The Sex Offender Housing Dilemma examines the placement process for released SVPs in California and the communities’ responses to those placements. Taking the reader into the center of these related issues, Monica Williams provokes debate on the role of communities in the execution of criminal justice policies, while also addressing the responsibility of government institutions to both groups of citizens. The Sex Offender Housing Dilemma is sure to promote increased civic engagement to help strengthen communities, increase public safety, and ensure government accountability.

New York; London: New York University Press, 2018. 288p.

Carjacking: Scope, Structure, Process, and Prevention

By Bruce A. Jacobs, and Michael Cherbonneau

Carjacking is a violent crime with a broad motivational landscape related to the unique opportunities that a motor vehicle, as the item targeted, makes available to offenders once it is stolen. Although carjacking is technically a form of robbery, carjacking is a hybrid offense because it draws from elements of both regular robbery and motor vehicle theft. Nuanced in its etiology and expression, carjacking boasts a structure and process that require offenders to navigate multiple challenges under considerable time pressure and uncertainty. The fact that carjacking is so often opportunistic yet simultaneously requires a fair amount of calculation makes the offense even more subtle in its complexity. The purpose of this review is to examine these nuances through the lens of official data and existing empirical research. Nascent but growing, this research provides insight into the scope of the problem, the method and manner of the crime's commission, and the challenges of curbing a clear urban menace.

Annual Review of Criminology, v. 6. 2023, 24pg

Homicide among Indigenous females in North Carolina: a comparison of publicly generated data and violent death reporting system

By Muhammad Hudhud, Scott Proescholdbell, Tammy Norwood, Crystal Cavalier-Keck, Ronny A Bel

Like other minoritized populations, American Indian/Alaska Native (AI/AN) females experience disparate morbidity and mortality outcomes to that of the general US population. This study identified discrepancies in reporting of AI/AN female decedents between the North Carolina Violent Death Reporting System (NC-VDRS) and an online, user-generated database. Female AI/AN decedent data of all ages were collected from the NC-VDRS and compared against that of the publicly available North Carolina Missing and Murdered Indigenous Women (MMIW NC) database for the study period, 2004–2019. Twenty-four of the 72 cases matched between data systems (33.3%). Substantive differences between the NC-VDRS and the MMIW NC database were found. Future efforts should be directed towards supporting Indigenous communities with the comprehensive data the NC-VDRS can provide. This paper highlights statewide public health systems like the NC-VDRS supporting community efforts to understand, advocate for, and disseminate information on MMIW.

Forensic Sciences Research, Volume 9, Issue 1. March 2024, 3pg

Identifying human trafficking indicators in the UK online sex market

By Luca Giommoni, Ruth Ikwu

   This study identifies the presence of human trafficking indicators in a UK-based sample of sex workers who advertise their services online. To this end, we devel oped a crawling and scraping software that enabled the collection of information from 17, 362 advertisements for female sex workers posted on the largest dedicated platform for sex work services in the UK. We then established a set of 10 indicators of human trafficking and a transparent and replicable methodology through which to detect their presence in our sample. Most of the advertisements (58.3%) contained only one indicator, while 3,694 of the advertisements (21.3%) presented 2 indicators of human trafficking. Only 1.7% of the advertisements reported three or more indica tors, while there were no advertisements that featured more than four. 3, 255 adver tisements (19.0%) did not contain any indicators of human trafficking. Based on this analysis, we propose that this approach constitutes an effective screening process for quickly identifying suspicious cases, which can then be examined by more compre hensive and accurate tools to identify if human trafficking is occurring. We conclude by calling for more empirical research into human trafficking indicators

Trends in Organized Crime. 2024, 14pg

Global Cybercrime: Federal Agency Efforts to Address International Partners' Capacity to Combat Crime

By U.S. Government Accountability Office

   The U.S. and its global partners are experiencing the effects of a massive cybercrime wave, which is growing in frequency and scale. In 2021, the Federal Bureau of Investigation received a record number of cybercrime complaints, over 840,000, with potential losses exceeding $6.9 billion. Further, in 2022, the intelligence community noted an increase in ransomware attacks by transnational criminals, which threaten to cause disruptions of critical services worldwide. GAO was asked to review federal efforts to build the capacity of allies and partner nations to combat cybercrime. This report’s specific objectives were to (1) describe challenges in building global capacity to combat cybercrime, and (2) determine actions selected federal agencies are taking to build foreign nations’ capacity to combat cybercrime and the extent to which they are evaluating the effectiveness of their efforts. GAO interviewed agency officials and convened a panel of experts representing entities focused on capacity building to combat global cybercrime. GAO also analyzed documentation from State, DOJ, and DHS, which provide the majority of U.S. capacity building assistance. What GAO Recommends GAO is making one recommendation to State to conduct a comprehensive evaluation of capacity building efforts to counter cybercrime. State concurred with the recommendation. 

 Washington, DC: GAO, 2023. 49p.

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance.

By National Academies of Sciences, Engineering, and Medicine; Division on Engineering and Physical Sciences; etc

Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforcement investigations to identifying potential security threats at large venues. However, advances in this technology have outpaced laws and regulations, raising significant concerns related to equity, privacy, and civil liberties.

This report explores the current capabilities, future possibilities, and necessary governance for facial recognition technology. Facial Recognition Technology discusses legal, societal, and ethical implications of the technology, and recommends ways that federal agencies and others developing and deploying the technology can mitigate potential harms and enact more comprehensive safeguards.

Washington, DC: National Academies Press, 2024.

A Longitudinal Study on Online Sexual Engagement, Victimization, and Psychosocial Well-Being

By: Felix Reer, Ruth Wendt, and Thorsten Quandt

Several cross-sectional studies have shown that online sexual engagement (OSE) in the form of sexting or sexy self-presentation on social media is associated with an increased risk of experiencing negative consequences, such as online sexual victimization (OSV) or lower levels of psychosocial well-being. However, representative and longitudinal studies are scarce. The current study follows three research goals: (1) examining the prevalence of OSE and OSV among a random-quota sample of 1,019 German Internet users aged 14–64 years, (2) examining gender and age-related differences in OSE and OSV, and (3) examining the longitudinal relationships between OSE, OSV, and psychosocial well-being over a period of 1 year. Our results indicate that OSE and OSV are relatively widespread: 17.7% of the participants had already experienced OSV, 25.3% indicated that they had presented themselves online in a sexualized manner at least once in the past 2 months, and 22.7% showed a certain willingness to engage in sexting. We found higher rates among the younger participants. However, to a certain degree, older individuals were also affected. Male participants showed higher sexting willingness and more often presented themselves in a sexualized manner than females, whereas only small differences related to OSV were found. Concerning relationships with psychosocial well-being, our cross-sectional results showed that OSE, OSV, and mental problems are intercorrelated. Furthermore, we detected a significant long-term relationship between higher sexting willingness at time 1 and more victimization experienced 1 year later, whereas no significant longitudinal associations with lower levels of psychosocial well-being were identified.

Front. Psychol., 07 December 2021

Respectable White Ladies, Wayward Girls, and Telephone Thieves in Miami’s “Case of the Clinking Brassieres”

By Vivien Miller 

This essay uses the 1950 “case of the clinking brassieres” to explore female theft in Miami at mid-century and the ways in which gender, race, class, respectability, and youth offered protections and shaped treatment within Florida’s criminal justice system. It focuses on the illegal activities of three female telephone employees, their criminal prosecution, and post-conviction relief. These seemingly respectable coin thieves challenged a familiar image of theft as a lower-class crime associated with poverty and economic need, while their blonde hair and white skin (and an idealization of the meanings of white beauty standards), complicated public attitudes in a period when “true” or serious criminals were racketeers and organised crime operatives.

European Social Science History Conference, 2013. 39p.

Countering Counterfeits: The Real Threat of Fake Products How Fake Products Harm Manufacturers, Consumers and Public Health—and How to Solve This Problem 

By The National Association of Manufacturers

Amid an unprecedented global health crisis, manufacturers have stepped up and taken the lead, working together and with national, state and local governments to fight the spread of COVID-19. Manufacturers deliver day-to-day necessities, lifesaving medical innovations and products that improve people’s lives in countless ways. While the pandemic has demonstrated anew the importance of American innovation and ingenuity, it has also revealed a serious threat: counterfeit products that put lives and livelihoods at risk. Counterfeiting is not a new problem; it has harmed manufacturers, American workers and consumers for years. But the problem is getting worse, and the COVID-19 pandemic has shown just how dangerous inaction can be. As part of the nation’s critical response effort, manufacturers have been supplying health care workers and other Americans on the front lines of this crisis with vital goods, including personal protective equipment, hospital beds, ventilators, hand sanitizers, cleaning supplies and other critical health care and safety products. But while manufacturing men and women work long hours to ramp up production of desperately needed products to fight the spread of this deadly illness, counterfeiters have exploited the crisis to peddle fake tests, dangerous vaccines and ineffective protective gear. These counterfeits are harming American citizens and hindering manufacturers’ efforts to protect their workers and communities. The prevalence of counterfeits in the COVID-19 response has brought new urgency to this long-simmering issue. So the National Association of Manufacturers is leading the charge against fake and counterfeit goods, bringing together diverse stakeholders and driving innovative policy solutions to address these issues once and for all and to ensure the long-term success of our sector and the safety and security of the people who rely on our products. 

Washington, DC: National Association of Manufacturers, 2020.  21p.

 The Impact of Organized Retail and Product Theft in the United States

By John Dunham & Associates

The Retail Industry Leaders Association (RILA) is the US trade association for retailers that have earned leadership status by virtue of their sales volume, innovation, or aspiration. The Buy Safe America Coalition (BSA) represents a diverse group of responsible retailers, consumer groups, manufacturers, intellectual property advocates and law enforcement officials who support efforts at all levels of government to protect consumers and communities from the sale of counterfeit and stolen goods. One important issue facing US retailers is the growth in the availability and sales of illicit products, both from counterfeit imports and from products stolen from legitimate retailers. These products are increasingly sold online through third-party marketplaces. RILA and BSA asked John Dunham & Associates (JDA) to examine the data around these illicit sales to determine how they impact the US economy, federal tax revenues, and criminal activity. This is the second in a series of papers examining the issue of organized retail crime (ORC), and its effect on the United States economy. This analysis will focus on product theft from brick-and- mortar retailers and the rise of organized theft operations that fence illegally obtained goods to consumers, increasingly online. While this paper focuses solely on those goods stolen from retail locations, there is a growing problem with consumer goods being stolen from containers and trucks as the supply chain has backed up in recent months. For the purpose of this analysis, cargo theft was not included. According to the analysis: • As much as $68.9 billion worth of products were stolen from retailers in 2019. This represents about 1.5 percent of total retail sales. • Law enforcement and retail asset protection officials have found that the availability of anonymous online marketplaces has provided an easy way to sell stolen goods, and that the growth of these marketplaces coincides with a recent surge in organized retail crime that puts both employees and customers in harm’s way. • Academic research has suggested that most retail theft represent crimes of opportunity. In other words, people steal when it is easy to do so. Other causes include poor economic conditions, and dissatisfaction among workers. However, professionals in the field identify the availability of anonymous on-line marketplaces as ways to easily fence goods, and prosecutorial changes as being major factors contributing to the growth in ORC. • The growth in on-line marketplaces is highly correlated (61 percent) to the number of shoplifting events reported each year. • In addition, those retail categories most subject to shoplifting activities are also the ones most sought after through on-line marketplaces. • Nearly 67 percent of asset protection managers at leading retailers surveyed report a moderate to considerable increase in organized retail crime, while 80 percent believe it will only get worse in the future.  The economic impact of retail crime is profound. Retailers face increased costs for lost product, security, and labor, which lead to higher prices for consumers and ultimately, lower sales. Lower sales translate to fewer jobs throughout the economy. The result is $125.7 billion in lost economic activity and 658,375 fewer jobs, paying almost $39.3 billion in wages and benefits to workers. • Retail theft is not a problem just in major metropolitan areas, it is pervasive across America. In fact, one factor that is associated with lower levels of retail theft is the density of retail locations. • The impact of theft is felt through higher prices, and this impact is more acutely felt by low- and middle-income families. • It is estimated that retail theft costs federal and state governments nearly $15 billion in personal and business tax revenues, not including the lost sales taxes.

Washington DC: Retail Industry Leaders Association (RILA) ;  Washington, DC:  Buy Safe American Coalition, 75p.

The Counterfeit Silk Road - Impact of Counterfeit Consumer Products Smuggled into the United States

By John Dunham & Associate

  The Buy Safe America Coalition represents a diverse group of responsible retailers, consumer groups, manufacturers, intellectual property advocates and law enforcement officials who support efforts at all levels of government to protect consumers and communities from the sale of counterfeit and stolen goods. One important issue facing US businesses is the massive growth in the availability and sales of illicit products, both from counterfeit imports — increasingly from China — and from products stolen from legitimate retailers and sold through online marketplaces, where the anonymity of a screenname has made it easier and more profitable to fence counterfeit and stolen goods. The Coalition asked John Dunham & Associates (JDA) to examine the data around these illicit sales to determine how they impact the US economy, federal tax revenues, and criminal activity. This is the first of a series of papers examining the issue of counterfeit and stolen goods and its effect on the United States economy. This analysis will focus on the importation of illicit products, notably counterfeits that violate producers’ intellectual property rights. Future analysis will examine the effects of domestic smuggling, the resale of stolen goods, and the effects of contraband on overall criminal activity. According to the analysis: • A large share of contraband items are delivered to US consumers by mail or by express consignment. These transactions account for over 60.8 percent of all seizures by the US customs service and over 90 percent of intellectual property rights (IPR) seizures. The growth in these types of shipments has increased along with the use of online marketplaces. Amazon, for instance, now derives more than 75 percent of their ecommerce revenue from marketplace sales. • In effect, as companies like the Chinese ecommerce marketplace Alibaba and the Amazon marketplace, have linked more consumers to more shippers, many companies producing illegitimate products have gained access to unwitting consumers in America. • The bulk of counterfeit products to the US come from China and its dependent territories, accounting for over 90.6 percent of all cargo with IPR violations. Of the $1.23 billion in total IPR violations intercepted, $1.12 billion was from China. • Examining just those data where CBP can provide an HS code, in some cases, the amount of contraband cargo is nearly equal to the entire import base. For example, imports of certain sweaters, jumpsuits and toys from China are almost 100 percent contraband, as are large amounts of handbags, jewelry and belts. • While there is substantial academic literature on the smuggling of narcotics, people and tobacco, there is very little written on counterfeit products. Using a very conservative model it is estimated that $44.3 billion in additional illicit cargo is escaping detection. • These lost sales alone mean that over 39,860 jobs in wholesaling and nearly 283,400 retail jobs are lost due to the impact of counterfeit goods skirting normal trade channels. All told, the sale of counterfeit items is expected to cost the wholesale and retail sectors of the US economy nearly 653,450 full-time equivalent jobs that pay over $33.6 billion in wages and benefits to US workers. • It is estimated that the smuggling of counterfeit goods costs the US government nearly $7.2 billion in personal and business tax revenues alone. • This analysis is based on the current level of CBP intercepts of illicit cargo. It is likely that the number of illegal imports is much larger than even estimated here.  

Washington, DC: Buy Safe America Coalition, 2021. 25p.

The Online Gaming Ecosystem: Assessing Digital Socialisation, Extremism Risks and Harms Mitigation Efforts

By Galen Englund and Jessica White

This report provides a review of the research on the exploitation of gaming and gaming‑adjacent platforms by violent extremists and the policies seeking to mitigate the impact of that exploitation. There is increasing interest in the nexus of online gaming and (violent) extremism. This report builds on the work of the Extremism and Gaming Research Network (EGRN) to provide a primer for those new to this space and an updated state of play of the cutting‑edge research taking place among members of the network and beyond. The report is divided into three sections. First, it lays out the online gaming ecosystem. The report identifies gamers, the unique individual and community identity formations that can happen in these spaces and the multifaceted environment in which this takes place, including games, gaming‑adjacent spaces and beyond. Second, it builds upon and enhances a typology of potential harms in the online gaming ecosystem. This typology allows clarification of the different ways in which extremism can both spread through these spaces and how extremists can specifically exploit these spaces and communities. Third, it provides an overview of some of the efforts that are currently ongoing to mitigate these potential harms. This includes efforts in the tech industry to reinforce policies and moderation efforts, by game designers to address potential challenges at an early stage and by practitioners who use online gaming engagement or gamification to prevent and counter violent extremism effectively. Finally, the report concludes by looking to the future of this exponentially expanding space. It offers some recommendations for research, policy and practice to better understand and address the threat of extremism within online gaming to protect and enhance online gaming as a positive engagement space.

London: Global Network on Extremism & Technology, 2023. 36p.

Cults and Online Violent Extremism

By Suzanne Newcombe, Sarah Harvey, Jane Cooper, Ruby Forrester, Jo Banks and Shanon Shah

The word ‘cultic’ is applied to a diverse range of online activity. This label is not always intended to convey a negative judgement; for example, individual influencers, music groups and brands aspire to a ‘cult following’. However, the use of the words ‘cult’ or ‘cultic’ is usually intended by the speaker as a judgement to draw attention to something that may have some elements typically associated with religion (for example, idealisation of a particular individual, a specific worldview and/or ritual practices) as well as the potential to cause harm and violence. This report proposes three ideal-typical groupings of online cultic activity that can glorify and inspire violent extremisms: ‘Cultic’ Religious Groups, ‘Online Cultic Milieus’ and ‘Cultic Fandoms’. This is not an exhaustive description of online activity that has been termed ‘cultic’ in popular culture, but it provides a good starting point for further analysis. This report argues that the understanding of ‘cults’ and online activity needs to be carefully nuanced; the complexities of online and offline activities that might result in violent extremism need to be analysed and risk assessed at the level of both group/social movement and individual. It is important to understand that there are a range of ways individuals interact with these cultic online environments that may or may not represent warning signs or pathways into violent extremism. A holistic understanding of both the nature of the cultic online milieu and an individual’s engagement with that environment is warranted before making assumptions about the nature of any individual’s engagement.

London: Global Network on Extremism and Technology (GNET), July 2023.

Offline versus online radicalization: Which is the bigger threat?  Tracing Outcomes of 439 Jihadist Terrorists Between 2014–2021 in 8 Western Countries

By Nafees Hamid and Cristina Ariza

Question: Are those radicalised offline or online more of a threat? Which group is harder to detect, more successful in completing attacks, and more lethal when they do so? Is the pattern different for youth versus older perpetrators and for men versus women? This report investigates these questions. Database: We created a database containing 439 perpetrators involved in 245 attacks between 1 January 2014 and 1 January 2021. It includes every publicly known completed attack and an extensive sampling of thwarted attacks. Attacks were all jihadist‑linked in eight Western countries: Australia, Austria, Belgium, France, Germany, Spain, the United Kingdom and the United States. Type of radicalisation: In our database, radicalisation primarily happens offline; over half the individuals in our database had been radicalised via offline networks. Success and lethality: Individuals who were radicalised offline were three times more likely than individuals radicalised online to complete an attack successfully. Those radicalised offline are 18 times more lethal than individuals in the online category. Those radicalised online are almost eight times more likely to fail than to succeed. Group attacks: Individuals who were radicalised offline are almost three times more likely to attack or plot in groups than individuals radicalised online. Success of group attacks: While groups were more likely to be thwarted by the police than to succeed (regardless of how individuals had been radicalised), successful groups of people radicalised offline were more lethal than their lone actor counterparts (15%). Family and friends: Some 87% of those with radicalised friends and 74% with radicalised relatives plotted or attacked together. Foreign fighters: Foreign terrorist fighters (FTFs), who were mostly radicalised offline, have the same success rate as non‑FTFs. But success rate increases if they have spent more than a year in a terrorist training location. Age: Online radicalisation is on the rise for young people (born from the 2000s onwards), although most individuals, including young people, are still radicalised offline. Gender: Women appear to be more likely to have been radicalised online. Bottom line: Those radicalised offline are greater in number, more successful in completing attacks and more deadly than those radicalised online.  

London: International Centre for the Study of Radicalisation, King’s College London. 2022. 40p.

What the research evidence tells us about coercive control victimisation

By Jasmine B. MacDonald, Melissa Willoughby, Pragya Gartoulla, Eliza Cotton, Evita March, Kristel Alla, Cat Strawa

Overview - Coercive control is the ongoing and repetitive use of behaviours or strategies (including physical and non-physical violence) to control a current or ex intimate partner (i.e. victim-survivor) and make them feel inferior to, and dependent on, the perpetrator (Australia’s National Research Organisation for Women’s Safety [ANROWS], 2021). Coercive control is a relatively new area to policy, practice and research and the research evidence is still emerging. However, AIFS’ consultations with key stakeholders in the child and family sector identified coercive control as a key topic of interest for policy makers and practitioners and that there is a desire for a synthesis of current evidence. This paper synthesises the findings of a rapid literature review to describe what we know about how common coercive control victimisation is, as well as risk factors and impacts of coercive control victimisation. A victim-survivor is someone who has experienced coercive control victimisation (i.e. been the target of coercive control behaviours by a current or ex intimate partner). The term victim-survivor is used to acknowledge ‘the ongoing effects and harm caused by abuse and violence as well as honouring the strength and resilience of people with lived experience of family violence’ (Victorian Government, 2022). The fndings of the rapid literature review are presented in 3 chapters: How common is coercive control victimisation? Risk factors associated with coercive control victimisation Impacts associated with coercive control victimisation. The key findings for each of these results sections are summarised in the subsections below. Please refer to the full chapter for more detail, including the evidence synthesis of relevant research studies and implications for practice, research and policy. Key messages Quality of coercive control victimisation research The studies sampled in this review provide important foundational insights about coercive control victimisation but had some limitations. These limitations were related to the relatively early stage of research on coercive control victimisation and the practical barriers associated with research in a complex area of human experience. Based on our review, we made the following observations about the state of evidence on coercive control victimisation in Australia: ƒ There is a need for research specifc to the Australian context. Only a small proportion of the sampled studies (3 out of 13; 23%) explored Australian experiences. ƒ We currently know little about the unique experiences of: – Aboriginal and/or Torres Strait Islander peoples – people with disability – LGBTQIA+ communities – culturally and linguistically diverse (CALD) communities – people in older age groups (65+ years) – children and young people where there is coercive control between their parents – intersectional experiences across more than one of the above. ƒ There is debate among researchers and experts about what exactly coercive control victimisation is and how it should be conceptualised: Some studies emphasised the gendered nature of coercive control and others did not. – Some studies have not used a measure of coercive control but rather a measure of domestic and family violence (DFV), sometimes from a previous study. In such instances, coercive control victimisation is often considered to be synonymous with the experience of psychological or emotional abuse behaviours as distinct from experiences of physical or sexual violence in the DFV measures. – Others, such as Stark and colleagues (Stark, 2007; Stark & Hester, 2019) and ANROWS (2021), conceptualise coercive control as the context in which intimate partner violence (IPV) occurs, meaning that physical and sexual violence are considered behaviours to enact coercive control (when not occurring in isolated incidence-based abuse). – Most studies (70%) used customised measurements of coercive control victimisation (i.e. measures constructed by the authors for the purpose of the study). Standardised and psychometrically validated measures were used by only 4 of the 13 sampled studies. ƒ Research design diferences between studies make it challenging to: – distinguish between IPV characterised by a coercive control pattern and that which is not – identify coercive control in practice – inform prevention and intervention – know which risk factors and impacts are most robust and deserving of further investigation. ƒ Most studies used a cross-sectional survey method for data collection. These studies cannot demonstrate changes for specific individuals over time or indicate coercive control victimization causing a change in outcomes such as mental health within the sampled participants. A longitudinal research design is required to demonstrate such changes and potential causation. ƒ Studies were also characterized by: – self-report data – large differences in sample sizes – an absence of demographic and other relevant social variables in analyses – a broad range of risk factors and impact measures, with little consistency of measures or replication of findings – a tendency to focus on individual-level factors associated with victimization, without equal consideration of broader institutional or societal levels.

Southbank VIC 3006 Australia Australian Institute of Family Studies, 2024 42p.

When Men Murder Women: An Analysis of 2020 Homicide Data

By Violence Policy Center

 Intimate partner violence against women is all too common and takes many forms. The most serious is homicide by an intimate partner. Guns can easily turn domestic violence into domestic homicide. One federal study on homicide among intimate partners found that female intimate partners are more likely to be murdered with a firearm than all other means combined, concluding that “the figures demonstrate the importance of reducing access to firearms in households affected by IPV [intimate partner violence].” Guns are also often used in non-fatal domestic violence. A study by Harvard School of Public Health researchers analyzed gun use at home and concluded that “hostile gun displays against family members may be more common than gun use in self-defense, and that hostile gun displays are often acts of domestic violence directed against women.” The U.S. Department of Justice has found that women are far more likely to be the victims of violent crimes committed by intimate partners than men, especially when a weapon is involved. Moreover, women are much more likely to be victimized at home than in any other place.5 A woman must consider the risks of having a gun in her home, whether she is in a domestic violence situation or not. While two thirds of women who own guns acquired them “primarily for protection against crime,” the results of a California analysis show that “purchasing a handgun provides no protection against homicide among women and is associated with an increase in their risk for intimate partner homicide.” A 2003 study about the risks of firearms in the home found that females living with a gun in the home were nearly three times more likely to be murdered than females with no gun in the home. Finally, another study reports, women who were murdered were more likely, not less likely, to have purchased a handgun in the three years prior to their deaths, again invalidating the idea that a handgun has a protective effect against homicide. While this study does not focus solely on domestic violence homicide or guns, it provides a stark reminder that domestic violence and guns make a deadly combination. According to reports submitted to the Federal Bureau of Investigation (FBI), firearms are rarely used to kill criminals or stop crimes.9 Instead, they are all too often used to inflict harm on the very people they were intended to protect.

Washington, DC: Violence Policy Center. 2022, 27pg

Counterfeits on Darknet Markets: A measurement between Jan-2014 and Sep-2015

By: Felix Soldner, Bennett Kleinberg, and Shane D Johnson

Counterfeits harm consumers, governments, and intellectual property holders. They accounted for 3.3% of worldwide trades in 2016, having an estimated value of $509 billion in the same year. While estimations are mostly based on border seizures, we examined openly labeled counterfeits on darknet markets, which allowed us to gather and analyze information from a different perspective. Here, we analyzed data from 11 darknet markets for the period Jan-2014 and Sep-2015. The findings suggest that darknet markets harbor similar counterfeit product types as found in seizures but that the share of watches is higher and lower for electronics, clothes, shoes, and Tobacco on darknet markets. Also, darknet market counterfeits seem to have similar shipping origins as seized goods, with some exceptions, such as a relatively high share (5%) of dark market counterfeits originating from the US. Lastly, counterfeits on dark markets tend to have a relatively low price and sales volume. However, based on preliminary estimations, the original products on the surface web seem to be worth a multiple of the prices of the counterfeit counterparts on darknet markets. Gathering insights about counterfeits from darknet markets can be valuable for businesses and authorities and be cost-effective compared to border seizures. Thus, monitoring darknet markets can help us understand the counterfeit landscape better.

Crime Science (2023) 12:18