The Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in social sciences
Offline versus online radicalization: Which is the bigger threat?  Tracing Outcomes of 439 Jihadist Terrorists Between 2014–2021 in 8 Western Countries

By Nafees Hamid and Cristina Ariza

Question: Are those radicalised offline or online more of a threat? Which group is harder to detect, more successful in completing attacks, and more lethal when they do so? Is the pattern different for youth versus older perpetrators and for men versus women? This report investigates these questions. Database: We created a database containing 439 perpetrators involved in 245 attacks between 1 January 2014 and 1 January 2021. It includes every publicly known completed attack and an extensive sampling of thwarted attacks. Attacks were all jihadist‑linked in eight Western countries: Australia, Austria, Belgium, France, Germany, Spain, the United Kingdom and the United States. Type of radicalisation: In our database, radicalisation primarily happens offline; over half the individuals in our database had been radicalised via offline networks. Success and lethality: Individuals who were radicalised offline were three times more likely than individuals radicalised online to complete an attack successfully. Those radicalised offline are 18 times more lethal than individuals in the online category. Those radicalised online are almost eight times more likely to fail than to succeed. Group attacks: Individuals who were radicalised offline are almost three times more likely to attack or plot in groups than individuals radicalised online. Success of group attacks: While groups were more likely to be thwarted by the police than to succeed (regardless of how individuals had been radicalised), successful groups of people radicalised offline were more lethal than their lone actor counterparts (15%). Family and friends: Some 87% of those with radicalised friends and 74% with radicalised relatives plotted or attacked together. Foreign fighters: Foreign terrorist fighters (FTFs), who were mostly radicalised offline, have the same success rate as non‑FTFs. But success rate increases if they have spent more than a year in a terrorist training location. Age: Online radicalisation is on the rise for young people (born from the 2000s onwards), although most individuals, including young people, are still radicalised offline. Gender: Women appear to be more likely to have been radicalised online. Bottom line: Those radicalised offline are greater in number, more successful in completing attacks and more deadly than those radicalised online.  

London: International Centre for the Study of Radicalisation, King’s College London. 2022. 40p.

Counterfeits on Darknet Markets: A measurement between Jan-2014 and Sep-2015

By: Felix Soldner, Bennett Kleinberg, and Shane D Johnson

Counterfeits harm consumers, governments, and intellectual property holders. They accounted for 3.3% of worldwide trades in 2016, having an estimated value of $509 billion in the same year. While estimations are mostly based on border seizures, we examined openly labeled counterfeits on darknet markets, which allowed us to gather and analyze information from a different perspective. Here, we analyzed data from 11 darknet markets for the period Jan-2014 and Sep-2015. The findings suggest that darknet markets harbor similar counterfeit product types as found in seizures but that the share of watches is higher and lower for electronics, clothes, shoes, and Tobacco on darknet markets. Also, darknet market counterfeits seem to have similar shipping origins as seized goods, with some exceptions, such as a relatively high share (5%) of dark market counterfeits originating from the US. Lastly, counterfeits on dark markets tend to have a relatively low price and sales volume. However, based on preliminary estimations, the original products on the surface web seem to be worth a multiple of the prices of the counterfeit counterparts on darknet markets. Gathering insights about counterfeits from darknet markets can be valuable for businesses and authorities and be cost-effective compared to border seizures. Thus, monitoring darknet markets can help us understand the counterfeit landscape better.

Crime Science (2023) 12:18

The overlap between child sexual abuse live streaming, contact abuse and other forms of child exploitation

By Coen Teunissen and Sarah Napier

We analysed the chat logs of seven Australia-based men who had committed 145 child sexual abuse (CSA) live streaming offences, to examine the overlap between this offending, contact sexual offending and engagement with child sexual abuse material (CSAM).

Four CSA live streaming offenders attempted to travel to offend against victims in person, in that they discussed travelling or actually booked flights in order to meet these children. Offenders also requested or received images and videos of victims they had viewed over live stream, and recorded live streams to produce CSAM.

Travelling to offend against children, use of CSAM and CSA live streaming appear to be interrelated and should be considered by law enforcement as potential risk factors for one another. Further, detection and removal of new CSAM, and scanning of live streams for abusive content, should be a priority for all electronic service providers.

Trends & issues in crime and criminal justice no. 671. Canberra: Australian Institute of Criminology. 2023. 16p.

Understanding fraudulent returns and mitigation strategies in multichannel retailing

By Danni Zhang, Regina Frei, P.K. Senyo, Steffen Bayer, Enrico Gerding, Gary Wills and Adrian Beck

The growth of online retailing has exceeded expectations over the last few years. This has resulted in high product return rates, which retailers are struggling with due to complex and costly returns processing, logistics, and financial implications. Additionally, online returns come with increased opportunities for returns fraud. During the pandemic, new types of returns fraud have emerged and returns fraud rates have increased across all channels. Based on a series of semi-structured interviews with retailers and retail experts, we investigate factors that enable fraudulent returns from consumers' and retailers’ perspectives and outline strategies for retailers to combat product returns fraud in a multichannel environment, leading to a framework for retail fraud. We contribute critical insights to research and practices on understanding and addressing a growing problem that has economic, social and environmental implications.

Journal of retailing and consumer services, Vol.70, 2023. 103145

VIIOLENCE IN AMERICA VOL.2. PROTEST, REBELLION, REFORM.

MAY CONTAIN MARKUP

EDIYED BY TED ROBERT GURR

VIIOLENCE IN AMERICA VOL.2. PROTEST, REBELLION, REFORM dives deep into the complex tapestry of societal upheaval within the United States. This compelling volume explores the multifaceted nature of violence in various forms, from protests to rebellions, and the calls for reform that echo through the nation. Through a collection of thought-provoking essays and analytical pieces, this book sheds light on the struggles, triumphs, and challenges that define contemporary American society. A must-read for those seeking a comprehensive understanding of the current landscape of dissent and transformation in the United States.

NEWBURY PARK. SAGE. 1989. 372p.

RACE, VIOLENCE, AND JUSTICE IN THE POST-WORLD WAR II SOUTH

may contain markup

By GAIL WILLIAMS O'BRIEN

On February 25, 1946, African Americans in Columbia, Tennessee, averted the lynching of James Stephenson, a nineteen-year-old, black Navy veteran accused of attacking a white radio repairman at a local department store. That night, after Stephenson was safely out of town, four of Columbia's police officers were shot and wounded when they tried to enter the town's black business district. The next morning, the Tennessee Highway Patrol invaded the district, wrecking establishments and beating men as they arrested them. By day's end, more than one hundred African Americans had been jailed. Two days later, highway patrolmen killed two of the arrestees while they were awaiting release from jail.

Drawing on oral interviews and a rich array of written sources, Gail Williams O'Brien tells the dramatic story of the Columbia "race riot," the national attention it drew, and its surprising legal aftermath. In the process, she illuminates the effects of World War II on race relations and the criminal justice system in the United States. O'Brien argues that the Columbia events are emblematic of a nationwide shift during the 1940s from mob violence against African Americans to increased confrontations between blacks and the police and courts. As such, they reveal the history behind such contemporary conflicts as the Rodney King and O. J. Simpson cases.

University of North Carolina Press, 1999, 334 pages

Testing human ability to detect ‘deepfake’ images of human faces 

By Sergi D. Bray , Shane D. Johnson and Bennett Kleinberg

Deepfakes’ are computationally created entities that falsely represent reality. They can take image, video, and audio modalities, and pose a threat to many areas of systems and societies, comprising a topic of interest to various aspects of cybersecurity and cybersafety. In 2020, a workshop consulting AI experts from academia, policing, government, the private sector, and state security agencies ranked deepfakes as the most serious AI threat. These experts noted that since fake material can propagate through many uncontrolled routes, changes in citizen behaviour may be the only effective defence. This study aims to assess human ability to identify image deepfakes of human faces (these being uncurated output from the StyleGAN2 algorithm as trained on the FFHQ dataset) from a pool of non-deepfake images (these being random selection of images from the FFHQ dataset), and to assess the effectiveness of some simple interventions intended to improve detection accuracy. Using an online survey, participants (N = 280) were randomly allocated to one of four groups: a control group, and three assistance interventions. Each participant was shown a sequence of 20 images randomly selected from a pool of 50 deepfake images of human faces and 50 images of real human faces. Participants were asked whether each image was AI-generated or not, to report their confidence, and to describe the reasoning behind each response. Overall detection accuracy was only just above chance and none of the interventions significantly improved this. Of equal concern was the fact that participants’ confidence in their answers was high and unrelated to accuracy. Assessing the results on a per-image basis reveals that participants consistently found certain images easy to label correctly and certain images difficult, but reported similarly high confidence regardless of the image. Thus, although participant accuracy was 62% overall, this accuracy across images ranged quite evenly between 85 and 30%, with an accuracy of below 50% for one in every five images. We interpret the findings as suggesting that there is a need for an urgent call to action to address this threat. 

Journal of Cybersecurity, 2023, 1–18 

Spaceless violence: Women’s experiences of technology-facilitated domestic violence in regional, rural and remote areas

By Bridget Harris & Delaine Woodlock

This project explored the impact of technology on victim–survivors of intimate partner violence in regional, rural or remote areas who are socially or geographically isolated. Specifically, it considered the ways that perpetrators use technology to abuse and stalk women, and how technology is used by victim–survivors to seek information, support and safety. Interviews and focus groups with 13 women were conducted in regional, rural and remote Victoria, New South Wales and Queensland. The findings showed that perpetrators used technology to control and intimidate women and their children. While this impacted women and children’s lives in significant ways, causing fear and isolation, the use of technology was often not viewed as a serious form of abuse by justice agents. 

Australia, Institute of Criminology. 2022, 81pg

Older Offenders in the Federal System

By Kristin M. Tennyson, Lindsey Jeralds, Julie Zibulsky

Congress requires courts to consider several factors when determining the appropriate sentence to be imposed in federal cases, among them the “history and characteristics of the defendant.” The sentencing guidelines also specifically authorize judges to consider an offender’s age when determining whether to depart from the federal sentencing guidelines. In this report, the Commission presents information on a relatively small number of offenders who were aged 50 or older at the time they were sentenced in the federal system. In particular, the report examines older federal offenders who were sentenced in fiscal year 2021 and the crimes they committed, then assesses whether age was given a special consideration at sentencing. This report specifically focuses on three issues that could impact the sentencing of older offenders: age and infirmity, life expectancy, and the risk of recidivism.

Washington, DC: United States Sentencing Commission, 2022. 68p.

The Criminal History of Federal Economic Crime Offenders

By Courtney Semisch

For the first time, this report provides in-depth criminal history information about federal economic crime offenders, combining the most recently available data from two United States Sentencing Commission projects. Key findings are that the application of guideline criminal history provisions differed among the different types of economic crime offenders. Also, The extent of prior convictions differed among the different types of economic crime offenders. Federal economic crime offenders did not “specialize” in economic crime. The severity of criminal history differed for offenders in the specific types of economic crime. Only about one-quarter of federal economic crime offenders with prior convictions were not assigned criminal history points under the guidelines.

Washington, DC: United States Sentencing Commission, 2020. 56p.

Network embeddedness in illegal online markets: endogenous sources of prices and profit in anonymous criminal drug trade

By Scott W. Duxbury and Dana L. Haynie

Although economic sociology emphasizes the role of social networks for shaping economic action, little research has examined how network governance structures affect prices in the unregulated and high-risk social context of online criminal trade. We consider how over-embeddedness—a state of excessive interconnectedness among market actors—arises from endogenous trade relations to shape prices in illegal online markets with aggregate consequences for short-term gross illegal revenue. Drawing on transaction-level data on 16 847 illegal drug transactions over 14months of trade in a ‘darknet’ drug market, we assess how repeated exchanges and closure in buyer– vendor trade networks nonlinearly influence prices and short-term gross revenue from illegal drug trade. Using a series of panel models, we find that increases in closure and repeated exchange raise prices until a threshold is reached upon which prices and gross monthly revenue begin to decline as networks become over-embedded. Findings provide insight into the network determinants of prices and gross monthly revenue in illegal online drug trade and illustrate how network structure shapes prices in criminal markets, even in anonymous trade environments.

Socio-Economic Review, 2023, Vol. 21, No. 1, 25–50

Balancing Privacy and Free Speech: Unwanted Attention in the Age of Social Media

By Mark Tunick

In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society’s interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a ‘right to be forgotten’, Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.

Abington, Oxon, UK; New York: Routledge, 2015. 229p.

Online Fraud: What does the public think?

By Amber Evans, Strategy & Insight Manager | Fernanda Reynoso-Serna, Analyst | Freya Smith, Analyst | Dr Ellie Brown, Head of Strategy | Sophie Davis

Most people are more worried about being affected by online fraud than other crimes, such as knife crime, burglary and sexual offences, according to a new large-scale survey – which also highlights the emotional impact of being an online fraud victim. The research, funded by the Dawes Trust, was based on a nationally representative sample of over 3,313 adults across England and Wales as part of a survey conducted by data organisation WALR. The vast majority of those polled, 92%, said online fraud was a very big or quite big problem in the UK. When asked what crimes they were most worried about being affected by, 55% said online fraud, 44% burglary and 47% knife crime. The poll also found that younger people (aged 18-34) were most likely to be affected by online fraud, with 32% reporting having been a victim in the last twelve months compared to 16% of over-35s. However, half of those questioned believed the elderly were most at risk. Of those who had been victims of online fraud: 20% said their physical health had suffered, 32% reported a psychological impact, 42% were affected financially, 47% experienced an emotional impact, including feeling embarrassed, angry or ashamed. 23% of all victims said they had experienced anxiety, 12% experienced disturbed sleep and 11% experienced depression as a result of the online fraud. The survey also shows that just over half of victims reported the fraud to either the police or Action Fraud. Victims were more likely to contact their bank (41%) than to go to the police (32%) or Action Fraud (28%), the UK’s national fraud reporting centre.

London: Crest Advisory, 2023. 32p.

Economic Crime and Illicit Finance in Russia’s Occupation Regime in Ukraine

By David Lewis

Despite Ukraine's ongoing counter-offensive, in September 2023 Russia still controlled around 17% of Ukrainian territory, an area roughly the size of Denmark. Russia's occupation of these Ukrainian territories relied primarily on repression and violence, but economic levers also played an important role in consolidating Russian rule. This paper details Russia's illicit economic activity in the occupied territories and calls for more international attention to this aspect of Russia's invasion. Since Russia occupied large parts of south-eastern Ukraine in March 2022, it has worked rapidly to incorporate these regions into Russia's economic and financial system. Key elements in this 'economic occupation' include: • The seizure of many Ukrainian businesses and assets. The occupation authorities 'nationalised' many companies and re-registered them as Russian businesses with new management. • The imposition of the Russian currency, financial and tax system, and the forced closure of Ukrainian banks. • The forcible takeover of farms or pressure on farmers to cooperate with the occupation authorities. Russian officials oversaw the illegal export of Ukrainian grain from the occupied territories. • The reconstruction of cities such as Mariupol, the city destroyed by Russian forces in spring 2022, in a multi-billion-dollar government programme that is profiting well-connected Russian companies. These acts were all illegal under Ukrainian law and some may constitute potential war crimes under international law. There should be more attention paid to these economic crimes internationally – with clear warnings for Russian business about the consequences under international law of seizing Ukrainian businesses and assets. Although international sanctions have targeted many officials in the Russian occupation structures, the approach should be more coordinated and systematic to raise the costs of Russian occupation. More international attention now would also assist in eventual reintegration and reconstruction of these regions. For example, a database of business seizures and economic crimes in the occupied territories would help to resolve legal issues and ensure business restitution in the aftermath of the war, while also serving as a potential basis for sanctions and eventual prosecutions. The economic aspects of occupation also raise complex questions of transitional justice for those who lived under Russian occupation. Ukrainian society is discussing how to define and respond to acts of collaboration in the occupied territories. International experience could help to inform legal and political solutions that meet the needs of justice but also seek to unite post-war Ukrainian society  

SOC ACE Research Paper No 20. 

Birmingham, UK: University of Birmingham , 2023. 43p.

justice, social sciencesMaddy B
Online Fraud Schemes: A Web of Deceit

By Europol

Europol's spotlight report on online fraud highlights that online fraud schemes represent a major crime threat in the EU and beyond as online fraudsters generate multiple billions in illicit profits every year to the detriment of individuals, companies and public institutions.
Fraud schemes are perpetrated with the intention of defrauding victims of their assets using false and deceitful pretexts, or with the use of cyberattack techniques. This results in the voluntary or involuntary transfer of personal or business information, money or goods to criminals.

From ATM attacks and account takeovers to skimming and shimming, the wide availability of crime-as-a-service has made this criminal activity more accessible. Criminals show great versatility and adaptability in adjusting their modi operandi and modelling their narratives around socio-economic trends as well as current crises, taking advantage of emergency situations to create charity scams.

This report is an accompanying module to Europol’s IOCTA, which aims at providing and understanding of modern cybercrime to equip law enforcement with the knowledge to tackle it and keep people safe. It delves into the complexities of online fraud schemes and sheds light on how different schemes overlap and victimise targets multiple times.

Key findings:

Relay attacks targeting payment card chips (shimming) are increasingly detected.

Charity scams leveraging emergency situations have increased. This was visible during the COVID-19 pandemic, the Russian invasion of Ukraine and the earthquake in Türkiye and Syria.

Logical attacks on ATMs still occur in the EU, with criminal networks testing ways to exploit new vulnerabilities at the ATMs they target.

Fraudsters display sophisticated modi operandi, which are usually a combination of different types of fraud. Victims of fraud are often re-victimised within the same criminal scheme.

Social engineering techniques that fraudsters use have been growing in complexity. Criminals adapt their techniques according to the profile of the victim and the typology of fraud.

Spotlight Series Report.

The Hague: EUROPOL, 2023. 20p.

social sciencesMaddy B
Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties

By: Ksenia Ermoshina and Francesca Musiani

Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties sets out to explore one of the core battlegrounds of Internet governance: the encryption of online communications. Current debates around encryption have fundamental implications for our individual liberties and collective presence on the Internet. Encryption of communications at scale and in increasingly usable ways has become a matter of public concern, especially since Edward Snowden’s 2013 revelations. A new cryptographic imaginary is taking hold, which sees encryption as a necessary precondition for the formation of networked publics. At the same time, there have been major evolutions and accelerations in the field of secure communications, prompted in part by the cryptography community’s renewed efforts to create next-generation secure messaging protocols and applications. It is vital that we unveil the very recent, and sometimes less recent history of these protocols and their key applications. The book takes on this task, in order to show how the opportunities and constraints they provide to Internet users came about, and how both developer communities and institutions are working towards making them available for the largest possible audience. It explores how efforts towards this goal are built upon interwoven stories about technical development and architectural choices, about community-building – and about Internet governance and politics. In doing so, the book focuses on the experience of encryption in a wide variety of contemporary secure messaging protocols and tools, and looks at the implications of these endeavors for the “making of” digital liberties on the Internet. Concealing for Freedom provides two key empirical and theoretical contributions. Firstly, it enriches a social sciences-informed understanding of encryption. It does so by examining how different solutions of cryptography for secure communications are created, developed, enacted, and governed, and what this diverse experience of encryption, operating across many different sites, means for online civil liberties. Secondly, it contributes to understanding the social and political implications of particular design choices when it comes to the technical architecture of digital networks, in particular their degree of (de-)centralization. The book explores developers’ actions and their interactions with other stakeholders, for instance users, security trainers, standardising bodies, and funding organizations. It also examines their interactions with the technical artifacts they develop, in which a core common objective is to create tools that “conceal for freedom” even as how this objective is met differs according to technical architectures, the user publics being targeted and the tools’ underlying values and business models.

Manchester, UK: Mattering Press, 2022. 274p.

Non-Fatal Shooting Crosswalk Study: FINAL REPORT

By Alaina De Biasi Edmund F. McGarrell Scott E. Wolfe

Historically, crime in the United States has been measured by the Uniform Crime Reporting (UCR) system administered by the Federal Bureau of Investigation (FBI). In this system, local, county, state, Tribal and federal law enforcement agencies submit summary crime data on incidents and arrests to the UCR system. Crime patterns and trends can then be analyzed and tracked at local, state, and national levels. 

United States, Michigan Justice Statistics Center, School of Criminal Justice, Michigan State University. 2023. 33pg

Racial Isolation, School Police, and the “School-To-Prison Pipeline”: An Empirical Perspective on the Enduring Salience of “Tipping Points”

By Michael Heise

Two broad trends inform public K-12 education’s current trajectory. One involves persisting (and recently increasing) school racial isolation which helps account for an array of costs borne by students, schools, and communities. A second trend, involving a dramatically increasing police presence in schools, is evidenced by a rising school resource officer (“SRO/police”) presence in schools. Increases in the magnitude of a school’s SRO/police presence correspond with increases in the school’s propensity to engage law enforcement agencies in student disciplinary matters which, in turn, help fuel a growing school-to-prison pipeline problem. While these two broad trends propel two distinct research literatures, these research literatures do not meaningfully engage with one another. Empirical research is largely silent on the degree to which, if at all, variation in a school’s racial isolation level influences how its SRO/police presence interacts with the school’s propensity to report student discipline issues to law enforcement agencies. This Article examines whether variation in school racial isolation levels informs whether a school’s SRO/police presence influences the school’s law enforcement reporting rates. Results from this study imply that any such influence is confined to schools where non-white student enrollment ranges from 11% to 50%. The research literature on tipping points provides one helpful interpretative lens to better understand why this specific school racial isolation band systematically differs from others when it comes to SRO/police presence’s influence on a school’s propensity to report student discipline matters to law enforcement agencies.

Buffalo Law Review Vol. 71, No. 2 (2023)

Yucatán as an Exceptionto Rising Criminal Violencein México

By Shannan Mattiace1and Sandra Ley

ucatán state’s homicide level has remained low and steady for decades and criminalviolence activity is low, even while crime rates in much of the rest of the country have increased since 2006. In this research note, we examine five main theoretical expla-nations for Yucatán’s relative containment of violence: criminal competition, protection networks and party alternation, vertical partisan fragmentation, interagency coordin-ation, and social cohesion among the Indigenous population. Wefind that in Yucatán,interagency coordination is a key explanatory variable, along with cooperation aroundsecurity between Partido Revolucionario Institucional and Partido Acción Nacionalgovernments and among federal and state authorities

journal of Politics in Latin America2022, Vol. 14(1) 103–119© The Author(s) 2022Article reuse guidelines:sagepub.com/journals-permissionsDOI: 10.1177/1866802X221079636journals.sagepub.com/home/pla

Anatomy of a Homicide Project An exploratory review of the homicides committed in Leon County between 2015-2020

By Sara Bourdeau,

At the direction of Sheriff Walt McNeil, the Leon County Sheriff’s Office (LCSO) began a review of data related to the 141 homicides recorded in Leon County from 2015-2020.A The purpose of this exploratory project was to gain a better understanding of the commonalities between the people, conditions, and circumstances contributing to the incidents. The Anatomy of a Homicide Project goals included: 1. Examining commonalities of homicide victims and offenders. 2. Identifying underlying issues, such as adverse childhood experiences (ACE), which may have contributed to or resulted in the homicides. 3. Understanding the various behavioral, social, environmental, economic, or situational factors experienced by both victims and offenders and how these factors may be correlated to the homicides. 4. Identifying commonalities in location, time, and methods by which homicides are committed. 5. Understanding motivational factors contributing to the homicides. 6. Identifying intelligence and investigative gaps and methods to better collect this data in the future. 7. Developing recommendations for targeted actions to mitigate contributing factors and prevent future homicides. The social, emotional, and financial costs of homicide for victims and offenders, the criminal justice system, the health care system, and society in general, far exceed those of other crimes. One study estimated the cost of one (1) murder to be 38 times higher than rape, 51 times higher than an armed robbery, and 119 times higher than an aggravated assault.1 Prevention of homicides is a top priority for the Leon County Sheriff’s Office. Additional research is needed to fully diagnose the problem and move forward with a series of people, place, and behavior-based strategies. When treated as a public health problem, using a scientific epidemiological approach, homicides can be prevented.2 It will take an ALLin community working together with focus, fairness, and a balanced approach of prevention and enforcement. The Leon County Sheriff’s Office dedicates this report to the victims of the homicides which occurred in Leon County from 2015-2020 and the families, friends, and neighborhoods impacted by these tragedies. While we will never fully understand the circumstances of these events, we will build on what we have learned by advocating for additional research, improved data collection and analysis, increased collaboration and information sharing between agencies, providers, and the community, and solutions which are both evidence-based and community informed.

2021 94p.