The Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

The Gozi group: A criminal firm in cyberspace?

By Jonathan Lusthaus, Jaap van Oss, and Philipp Amann

The relative glut of data on cybercriminal forums has led to a growing understanding of the functioning of these virtual marketplaces. But with a focus on illicit online trading, less attention has been paid to the structures of groups that carry out cybercrimes in an operational sense. In economic parlance, some such groups may be known as ‘firms’. This concept has been a significant part of the literature on more traditional forms of organised crime, but is not widely discussed in the cybercrime discourse. The focus of this article is, by way of a case study of the Gozi malware group, to explore the applicability of the concept of firms to the novel environment of cybercrime.

European Journal of Criminology, 20(5), 1701-1718. https://doi.org/10.1177/14773708221077615

Shoplifting in mobile checkout settings: cybercrime in retail stores

By John Aloysius, Ankur Arora, Viswanath Venkatesh

Purpose: Retailers are implementing technology-enabled mobile checkout processes in their stores to improve service quality, decrease labor costs and gain operational efficiency. These new checkout processes have increased customer convenience primarily by providing them autonomy in sales transactions in that store employee interventions play a reduced role. However, this autonomy has the unintended consequence of altering the checks and balances inherent in a traditional employee-assisted checkout process. Retailers, already grappling with shoplifting, with an estimated annual cost of billions of dollars, fear that the problem may be exacerbated by mobile checkout and concomitant customer autonomy. The purpose of this paper is to understand the effect of mobile checkout processes in retail stores on cybercrime in the form of shoplifting enabled by a technology transformed the retail environment. Design/methodology/approach The authors conducted an online survey of a US sample recruited from a crowdsourced platform. The authors test a research model that aims to understand the factors that influence the intention to shoplift in three different mobile checkout settings − namely, smartphone checkout settings, store-provided mobile device checkout settings, and employee-assisted mobile checkout settings − and compare it with a traditional fixed location checkout setting. Findings: The authors found that, in a smartphone checkout setting, intention to shoplift was driven by experiential beliefs and peer influence, and experiential beliefs and peer influence had a stronger effect for prospective shoplifters when compared to experienced shoplifters; in a store-provided mobile devices checkout setting, experiential beliefs had a negative effect on shoplifters’ intention to shoplift and the effect was weaker for prospective shoplifters when compared to experienced shoplifters. The results also indicated that in an employee-assisted mobile checkout setting, intention to shoplift was driven by experiential beliefs and peer influence, and experiential beliefs had a stronger effect for prospective shoplifters when compared to experienced shoplifters. Originality/value: This study is the among the first, if not first, to examine shoplifters’ intention to shoplift in mobile checkout settings. We provide insights into how those who may not have considered shoplifting in less favorable criminogenic settings may change their behavior due to the autonomy provided by mobile checkout settings and also provide an understanding of the shoplifting intention for both prospective and experienced shoplifters in different mobile checkout settings.

Information Technology and People, April 2019, 32(5):1234-1261

The Port-Crime Interface: A Report on Organised Crime and Corruption in Seaports

By  Anna Sergi

This project involved qualitative primary research into criminality within seaports, by observing how ports, as microcosmic realities run through formal and informal relationships and have specific security vulnerabilities, which facilitate different types of illegal or deviant behaviours. Research has been carried out in two European ports (Liverpool and Genoa) and three non-European ones (Montreal, New York and Melbourne), which are either targets of, or transit zones for, criminal activities and criminal networks.  The main aim of this comparative research project was to improve policy understanding of how the complex relationships within ports act as conduits or facilitators in how criminal networks operate in the territory of and around the ports. With specific attention to the changing geopolitical conditions surrounding the port of Liverpool within the Brexit scenario, the study has looked at what could be learned in the British experience from international ones both in terms of security and in terms of transnational risk assessments. 

London: University of Essex, 2020.    230p.

Economic Crime and Illicit Finance in Russia’s Occupation Regime in Ukraine

By David Lewis

Despite Ukraine's ongoing counter-offensive, in September 2023 Russia still controlled around 17% of Ukrainian territory, an area roughly the size of Denmark. Russia's occupation of these Ukrainian territories relied primarily on repression and violence, but economic levers also played an important role in consolidating Russian rule. This paper details Russia's illicit economic activity in the occupied territories and calls for more international attention to this aspect of Russia's invasion. Since Russia occupied large parts of south-eastern Ukraine in March 2022, it has worked rapidly to incorporate these regions into Russia's economic and financial system. Key elements in this 'economic occupation' include: • The seizure of many Ukrainian businesses and assets. The occupation authorities 'nationalised' many companies and re-registered them as Russian businesses with new management. • The imposition of the Russian currency, financial and tax system, and the forced closure of Ukrainian banks. • The forcible takeover of farms or pressure on farmers to cooperate with the occupation authorities. Russian officials oversaw the illegal export of Ukrainian grain from the occupied territories. • The reconstruction of cities such as Mariupol, the city destroyed by Russian forces in spring 2022, in a multi-billion-dollar government programme that is profiting well-connected Russian companies. These acts were all illegal under Ukrainian law and some may constitute potential war crimes under international law. There should be more attention paid to these economic crimes internationally – with clear warnings for Russian business about the consequences under international law of seizing Ukrainian businesses and assets. Although international sanctions have targeted many officials in the Russian occupation structures, the approach should be more coordinated and systematic to raise the costs of Russian occupation. More international attention now would also assist in eventual reintegration and reconstruction of these regions. For example, a database of business seizures and economic crimes in the occupied territories would help to resolve legal issues and ensure business restitution in the aftermath of the war, while also serving as a potential basis for sanctions and eventual prosecutions. The economic aspects of occupation also raise complex questions of transitional justice for those who lived under Russian occupation. Ukrainian society is discussing how to define and respond to acts of collaboration in the occupied territories. International experience could help to inform legal and political solutions that meet the needs of justice but also seek to unite post-war Ukrainian society  

SOC ACE Research Paper No 20. 

Birmingham, UK: University of Birmingham , 2023. 43p.

justice, social sciencesMaddy B
Supply Chain Risks of Illicit Trade in Counterfeit Pharmaceuticals

By Jay P. Kennedy

 Nearly every type of product that has ever been produced has been counterfeited. While the most counterfeited goods tend to be footwear, luxury items, watches, and jewelry, in recent years there has been a dramatic increase in the prevalence of pharmaceutical counterfeits. The World Health Organization (WHO) defines counterfeit medicines as “medicines that are mislabeled deliberately and fraudulently”, yet counterfeit medicines are generally discussed alongside other forms of harmful medical products such as adulterated, expired, substandard, stolen, and falsified medicines. Each of these products moves through a mix of illegitimate and legitimate intermediaries and distribution channels before making their way into healthcare systems and ultimately to patients. Counterfeit pharmaceuticals harm patients, the healthcare system, legitimate companies, and society. While their presence within the legitimate supply chain is increasing, the threats posed by these illicit goods can be countered through focused action and collaboration amongst industry, healthcare, and law enforcement. This paper discusses three primary risks to consumers and the healthcare infrastructure of Texas: (1) the infiltration of counterfeit drugs into the legitimate supply chain; (2) the direct threat posed by counterfeit pharmaceuticals; and (3) the risks posed by counterfeit drugs to national security and the legitimate supply chain. The paper concludes with a discussion of policy and anti-counterfeiting strategy recommendations aimed at addressing each of the identified risks and protecting Texans, Americans, and the healthcare supply chain.   

Huntsville, TX: Institute for Homeland Security, Sam Houston State University, 2023. 18p.

justiceMaddy B
Online Fraud Schemes: A Web of Deceit

By Europol

Europol's spotlight report on online fraud highlights that online fraud schemes represent a major crime threat in the EU and beyond as online fraudsters generate multiple billions in illicit profits every year to the detriment of individuals, companies and public institutions.
Fraud schemes are perpetrated with the intention of defrauding victims of their assets using false and deceitful pretexts, or with the use of cyberattack techniques. This results in the voluntary or involuntary transfer of personal or business information, money or goods to criminals.

From ATM attacks and account takeovers to skimming and shimming, the wide availability of crime-as-a-service has made this criminal activity more accessible. Criminals show great versatility and adaptability in adjusting their modi operandi and modelling their narratives around socio-economic trends as well as current crises, taking advantage of emergency situations to create charity scams.

This report is an accompanying module to Europol’s IOCTA, which aims at providing and understanding of modern cybercrime to equip law enforcement with the knowledge to tackle it and keep people safe. It delves into the complexities of online fraud schemes and sheds light on how different schemes overlap and victimise targets multiple times.

Key findings:

Relay attacks targeting payment card chips (shimming) are increasingly detected.

Charity scams leveraging emergency situations have increased. This was visible during the COVID-19 pandemic, the Russian invasion of Ukraine and the earthquake in Türkiye and Syria.

Logical attacks on ATMs still occur in the EU, with criminal networks testing ways to exploit new vulnerabilities at the ATMs they target.

Fraudsters display sophisticated modi operandi, which are usually a combination of different types of fraud. Victims of fraud are often re-victimised within the same criminal scheme.

Social engineering techniques that fraudsters use have been growing in complexity. Criminals adapt their techniques according to the profile of the victim and the typology of fraud.

Spotlight Series Report.

The Hague: EUROPOL, 2023. 20p.

social sciencesMaddy B
Understanding pet scams: A case study of advance fee and non-delivery fraud using victims’ accounts

By Jack Whittaker and Mark Button

Advance fee and non-delivery frauds have become very common with the growing preference for online shopping and the new opportunities this brings for online offenders. This article uses unique access to a volunteer group’s database focused on preventing pet scams to explore this type of crime. Distances, among other factors, make the purchase of pets online common in countries such as the USA, Australia and South Africa. This modality of purchase has been exploited by organized criminals largely based in Cameroon to conduct advance fee and non-delivery frauds. The article uses data from the volunteer group Petscams.com to provide unique insights on the techniques of the offenders with particular reference to the strategies used to maximize victimization by using real accounts of victims of such frauds. It also briefly notes how the COVID-19 crisis has been used to adapt this type of scam. The article’s discussion identifies the need for a more nuanced assessment into the role of victim-oriented voluntary organizations.

Australian & New Zealand Journal of Criminology 2020, Vol. 53(4) 497–514

Fraud and its relationship to pandemics and economic crises: From Spanish flu to COVID-19

By Michael Levi and Russell G Smith

This report seeks to draw out the common characteristics of frauds associated with pandemics, and to identify any risks unique to pandemics and financial crises, beginning with the Spanish flu pandemic of 1918, as the closest to COVID-19 in the modern era. It summarises the general influence of the internet or remote intrusions on contemporary frauds and allied corporate/ organised crimes against individuals, businesses and government, using plausibly reliable data from Australia and the United Kingdom as indicative of more general trends. The report identifies some novel crime types and methodologies arising during the COVID-19 pandemic of 2020 that were not seen in previous pandemics. These changes may result from public health measures taken in response to COVID-19, the current state of technologies and the activities of law enforcement and regulatory guardians. The report notes that many frauds occur whatever the state of the economy, but that some specific frauds occur during pandemics, especially online fraud. Similarly, some previously occurring frauds are revealed by economic crises, while frauds arising from and causing insolvencies are stimulated by economic crises. The report concludes with a discussion of the policy implications for prevention, resilience and for private and public policing and criminal justice in Australia. It stresses the need for plans for future pandemics and economic crises to include provisions for better early monitoring and control of fraud and procurement corruption. Research Report no. 19.

Canberra: Australian Institute of Criminology, 2021. 74p.

Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits

By Marianne Junger*, Victoria Wang, Marleen Schlömer

This study analyses 300 cases of fraudulent activities against Dutch businesses, 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice. We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort and output financial benefit. Results indicate that whilst all CEO-frauds are conducted online, most of the fraudulent contracts and ghost invoices are undertaken via offline means. Both Routine Activity Theory and Rational Choice Model are evidenced-fraudsters clearly take the business size and seasonality into account, and the input criminal effort and output criminal benefit are positively correlated. Having vigilant employees is evidenced as the most effective way of fraud prevention, both online and offline.

Crime Science 9(1): 1–15. 2020.

Online fraud victimization in Australia: Risks and protective factors.

By: Catherine Emami, Russell G Smith and Penny Jorna

Online fraud includes dating or romance scams, deceptive sales of products and services, dishonest investment schemes, lottery or inheritance scams, working from home scams or lottery fraud involving false prize draws or sweepstakes. These frauds are costly not only in their financial impact on business and government, but also because of the detrimental impact they have on victims. To gain a better understanding of online consumer fraud, the Australian Institute of Criminology worked with the Australian Competition and Consumer Commission to compare a matched sample of victims and non-victims. This study aimed to identify and quantify the factors that make some individuals more vulnerable to consumer fraud than others. It was found that greater familiarity with online activities resulted in a reduced likelihood of victimization and that victims were more likely to have used money wire transfers and electronic funds transfers to send money in response to scam invitations than other forms of payment. These findings support the development of targeted awareness-raising campaigns focusing on the online behaviour most likely to lead to fraud victimization. It offers policymakers and consumer affairs organisations opportunities to better target fraud prevention and education initiatives.

Research Report no. 16. Canberra: Australian Institute of Criminology, 2019. 98p.

Examining emerging fraud facilitated by the internet through crime scripts

By Benoit Leclerc and Elena Morgenthaler

The rise of the internet or, more specifically, of services offered and conducted online has led to a dramatic rise in frauds and scams. This study is a systematic review of the literature on the use of crime script analysis in the field of fraud facilitated by the internet to identify stages of the crime commission process across different forms of fraud and examine ways to disrupt those crimes. The scripts for different forms of fraud shared three common elements: communicating with the victim, recruiting enablers, and using money mules. These common elements suggest possible prevention measures. Future applications of crime scripts in the field of fraud and financial crime more broadly are discussed.

Trends & issues in crime and criminal justice no. 680.

Canberra: Australian Institute of Criminology. 2023. 28p.

Laundering Love: A Multi-Case Analysis of the Evolution of Romance Scam Victims into Co-Offending Money Mules

By: Christopher k. Huhn

From the thesis: "This thesis addresses the problems of rapidly rising cyber-enabled fraud and concomitant money laundering by focusing on romance scam victims who evolve into willing partners in money laundering schemes, known as 'witting money mules.' This thesis explores how and why individuals become money mules after victimization in online romance scams. The thesis employs a grounded theory approach and investigates data from over 134,000 historical text messages between three offenders and 22 victims, as well as three participant interviews with romance scam victims. The data resulted in a grounded theory that a romantically lonely victim who persistently engages online with an offender that strategically repeats scheme-relevant premises in the guise of a romantic partner can result in the victim acceding to the offender's exploitative requests and the eventual decision to co-offend. This theory also explains how a person can simultaneously be a victim and offender and why they would intentionally choose to help the romance scammer launder money. The literature and data similarly support a suggested definition for 'grooming' in the context of romance scams. As a whole, this thesis provides insight into romance scams and money mules as a strategic pivot point that, if disrupted, can simultaneously impact a criminal organization's ability to profit from romance scams and launder the proceeds of cyber-enabled fraud."

Monterey, CA: Naval Postgraduate School (U.S.). Center for Homeland Defense and Security, 2023. 182p.

Financial Crime Scripting: an Analytical Method to Generate, Organise and Systematise Knowledge on the Financial Aspects of Profit-Driven Crime

By Thom Snaphaan and Teun van Ruitenburg

This article presents a further development of the existing crime scripting framework to enhance insight in the financial aspects of profit-driven crime: financial crime scripting. By drawing on the foundations of crime script analysis, financial crime scripting allows to generate, organize and systematize knowledge about the financial aspects of the crime commission processes of a variety of crime types, and accounts for linking the dots with financial crimes, such as bribery, bankruptcy fraud and money laundering. Viewing these financial crimes as supporting or succeeding offences in light of profit-driven crimes, and at the same time providing guidance to analyze these offences as profit-driven crimes in itself, opens the door for detailed analyses without losing sight of the bigger picture, i.e., the interconnectedness with other crimes. This analytical method helps crime researchers to take into account the financial aspects of crime-commission processes in crime script analyses and could help law enforcement agencies and other crime prevention partners to go beyond a proceeds-of-crime approach and put a follow-the-money approach in practice. Financial crime scripting takes full account of the financial aspects of profit-driven crime and puts relevant concepts in broader perspective, enhancing understanding with conceptual clarity. In addition to outlining the framework, the relevance for policy and practice is unraveled and avenues for future research are discussed.)

European Journal on Criminal Policy and Research, 2024.

Video Games, Crime and Next-Gen Deviance: Reorienting the Debate

Edited by Adam Lynes, Craig Kelly, and Kevin Hoffin

In recent decades the video games industry has grown astronomically, quickly becoming a substantial part of our everyday lives. Alongside the rise of this technology, the media, academia and, in some cases, governments, have drawn correlations between video games and serious instances of violence, focusing most notably on mass shootings. This narrow debate has distracted from our understanding of many of the harms which video games can, in some cases, cause, perpetuate or hide. Drawing upon the emerging deviant leisure perspective, this book seeks to re-orientate the debate on video games and their associated potential harms. Through the examination of culturally embedded harms such as gambling, sexual violence and addiction, together with the rise in swatting and other activities, the authors explore the notion that video games are inexplicably intertwined with aspects of deviancy.

Bingley, UK: Emerald Publishing, 2020. 208p.

Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties

By: Ksenia Ermoshina and Francesca Musiani

Concealing for Freedom: The Making of Encryption, Secure Messaging and Digital Liberties sets out to explore one of the core battlegrounds of Internet governance: the encryption of online communications. Current debates around encryption have fundamental implications for our individual liberties and collective presence on the Internet. Encryption of communications at scale and in increasingly usable ways has become a matter of public concern, especially since Edward Snowden’s 2013 revelations. A new cryptographic imaginary is taking hold, which sees encryption as a necessary precondition for the formation of networked publics. At the same time, there have been major evolutions and accelerations in the field of secure communications, prompted in part by the cryptography community’s renewed efforts to create next-generation secure messaging protocols and applications. It is vital that we unveil the very recent, and sometimes less recent history of these protocols and their key applications. The book takes on this task, in order to show how the opportunities and constraints they provide to Internet users came about, and how both developer communities and institutions are working towards making them available for the largest possible audience. It explores how efforts towards this goal are built upon interwoven stories about technical development and architectural choices, about community-building – and about Internet governance and politics. In doing so, the book focuses on the experience of encryption in a wide variety of contemporary secure messaging protocols and tools, and looks at the implications of these endeavors for the “making of” digital liberties on the Internet. Concealing for Freedom provides two key empirical and theoretical contributions. Firstly, it enriches a social sciences-informed understanding of encryption. It does so by examining how different solutions of cryptography for secure communications are created, developed, enacted, and governed, and what this diverse experience of encryption, operating across many different sites, means for online civil liberties. Secondly, it contributes to understanding the social and political implications of particular design choices when it comes to the technical architecture of digital networks, in particular their degree of (de-)centralization. The book explores developers’ actions and their interactions with other stakeholders, for instance users, security trainers, standardising bodies, and funding organizations. It also examines their interactions with the technical artifacts they develop, in which a core common objective is to create tools that “conceal for freedom” even as how this objective is met differs according to technical architectures, the user publics being targeted and the tools’ underlying values and business models.

Manchester, UK: Mattering Press, 2022. 274p.

Non-Fatal Shooting Crosswalk Study: FINAL REPORT

By Alaina De Biasi Edmund F. McGarrell Scott E. Wolfe

Historically, crime in the United States has been measured by the Uniform Crime Reporting (UCR) system administered by the Federal Bureau of Investigation (FBI). In this system, local, county, state, Tribal and federal law enforcement agencies submit summary crime data on incidents and arrests to the UCR system. Crime patterns and trends can then be analyzed and tracked at local, state, and national levels. 

United States, Michigan Justice Statistics Center, School of Criminal Justice, Michigan State University. 2023. 33pg

Racial Isolation, School Police, and the “School-To-Prison Pipeline”: An Empirical Perspective on the Enduring Salience of “Tipping Points”

By Michael Heise

Two broad trends inform public K-12 education’s current trajectory. One involves persisting (and recently increasing) school racial isolation which helps account for an array of costs borne by students, schools, and communities. A second trend, involving a dramatically increasing police presence in schools, is evidenced by a rising school resource officer (“SRO/police”) presence in schools. Increases in the magnitude of a school’s SRO/police presence correspond with increases in the school’s propensity to engage law enforcement agencies in student disciplinary matters which, in turn, help fuel a growing school-to-prison pipeline problem. While these two broad trends propel two distinct research literatures, these research literatures do not meaningfully engage with one another. Empirical research is largely silent on the degree to which, if at all, variation in a school’s racial isolation level influences how its SRO/police presence interacts with the school’s propensity to report student discipline issues to law enforcement agencies. This Article examines whether variation in school racial isolation levels informs whether a school’s SRO/police presence influences the school’s law enforcement reporting rates. Results from this study imply that any such influence is confined to schools where non-white student enrollment ranges from 11% to 50%. The research literature on tipping points provides one helpful interpretative lens to better understand why this specific school racial isolation band systematically differs from others when it comes to SRO/police presence’s influence on a school’s propensity to report student discipline matters to law enforcement agencies.

Buffalo Law Review Vol. 71, No. 2 (2023)

Project Safe Neighborhoods: Saginaw Violent Gang and Gun Crime Reduction Program

By Yongjae (David) Nam, Travis Carter, Scott Wolfe, Allison Rojek, Spencer G. Lawson

The City of Saginaw (MI) was financially crippled by the lengthy national recession and steady
deterioration of the domestic automobile industry. Once home to five automobile production
plants, four of those sites now sit uninhabited. Several other major manufacturers have closed
plants or drastically reduced the number of employees. These losses dramatically increased
unemployment and devastated the city’s tax base. According to the Bureau of Labor Statistics,
unemployment in Saginaw peaked in July 2009, standing at 23.5%. The 2018 American Community
Survey indicates that the unemployment rate for Saginaw was 14.9%. This rate is higher compared
to a national unemployment rate of 5.9% and a rate of 6.5% for Michigan. The 2010 Census reports
that Saginaw’s median household income was $29,809 and per capita income was a mere $16,153,
both nearly half the state of Michigan and U.S. averages. About 33.6% of the total population lives
below the poverty line, more than double the state of Michigan average (14.2%) and nearly triple
the U.S. average (12.3%). Census reports show the population of Saginaw decreased by nearly
13,000 people (20.7%) from 2000 to 2018 (from 61,799 to 48,997 people). Saginaw’s population
decline, deteriorating property values, shrinking income tax collections, and drastically reduced
state revenue sharing continue to severely impact the city’s ability to provide basic public services,
creating quality of life issues and high violent crime rates. Despite a high incidence of crime, poor
economic conditions forced the city to make the inevitable decision to reduce the size of its police
department from 160 police officers in 1997 to its current level of 54 officers (66.3% decrease).
From 2016 to 2018, 42 homicides were committed in Saginaw. Most were committed with a
firearm, and more than three-fourths were drug and/or gang-related. Additionally, there were
another 138 victims of non-fatal shootings. In 2018, Saginaw’s violent crime rate per 100,000
residents (1,621) was more than four times the national average (381) and more than three times
Michigan’s average (449). In addition, Saginaw’s homicide rate (22.8) was over four times both the
national average (5.0) and Michigan’s average (5.5). Moreover, data reveal that Saginaw's overall
crime rates are 64% higher than Michigan’s average and are 34% higher than the nation's average.
The Saginaw Violent Gang and Gun Crime Reduction Program (hereafter, Saginaw PSN) was
aimed at addressing these problems. Table 1 provides an overview of the goals, objectives, and
outcomes of the Saginaw PSN program

East Lansing, MI: School of Criminal Justice, Michigan State University., 2022. 53p.

Michigan State Police Traffic Enforcement: An Assessment of Policies, Training, and Operations

By Thomas Christoff, Benjamin Carleton, Margarita Parker, Kaitlin Moloney, Alexa Blondin, and Bill Taylor

Traffic enforcement encounters represent one of the most common interactions that the public has with law enforcement, with more than 20 million people pulled over for a traffic stop in the US each year (Baumgartner et al., 2021). Police officers make at least three important decisions during a traffic stop encounter, including whether to initiate a traffic stop, whether to conduct a search of persons or the vehicle, and how the officer will sanction the driver (Schafer et al., 2006). Similarly, traffic enforcement is also one of the primary responsibilities of the Michigan State Police (MSP), with MSP having conducted 287,065 traffic stops in 2022.1 In January of 2021, MSP took proactive steps to begin a partnership with researchers from the School of Criminal Justice at Michigan State University (MSU) to understand whether racial/ethnic disparities exist in traffic stop behavior by MSP patrol members. As part of MSP’s partnership with MSU, MSU researchers examined data for MSP traffic stops conducted during the year 2020. Overall, MSU’s analysis found that “African-American drivers experienced significant disparities with respect to MSP traffic stops.” In addition, MSU’s analysis found that “Hispanic drivers were significantly more likely than White drivers to be searched or arrested after traffic stops.” MSU conducted a second round of traffic stop data analysis using MSP data for traffic stops conducted during 2021. In this second round, MSU added a Post-by-Post analysis, which revealed that “a small proportion of MSP posts accounted for the racial and ethnic disparities observed statewide.” The analysis also revealed disparities in traffic stops for African-American drivers in Secure Cities Partnership (SCP) locations. Upon receiving MSU’s initial findings, MSP leadership responded in January 2022 with the unveiling of a multifaceted Five-Point Plan intended to address racial disparities in traffic enforcement. The five points focused on understanding the contributors to disparities in traffic stops and exploring ways in which MSP could effectively reduce such disparities. The point most relevant to this assessment is the first one, which involves the hiring of an independent consulting firm to review MSP policies and make recommendations that will address racial disparities. MSP issued a request for proposals in March 2022 seeking an independent consulting firm to conduct this work, and the CNA Corporation (CNA) was awarded the contract to assess MSP traffic enforcement policies and program initiatives over the course of 18 months, starting in June 2022. CNA’s approach to this assessment focused on the full lifecycle of a trooper, including how MSP recruits and hires its troopers, instructs and trains its troopers, and supervises its troopers. We also considered organizational factors that are relevant to traffic enforcement and equitable policing. To assess MSP’s traffic enforcement policies and program initiatives, we used a variety of sources, including document review, targeted interviews, focus groups, ride-alongs, and quantitative data analysis. This report details the findings and recommendations of this focused assessment and consists of the following five main sections: 1. Methodology and Approach 2. Recruitment and Hiring Policies, Trainings, and Practices 3. Trooper Policies, Trainings, and Practices 4. Supervisor Policies, Trainings, and Practices 5. Organizational Processes and Initiatives   

Arlington VA: CNA, 2023. 95p.