Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Sport and physical activity as an intervention for reintegration and resettlement: key mechanisms for policy and practice

By Haydn Morgan and Andrew Parker

  Recent years have witnessed a growing interest at a policy level regarding the intentional use of sport and physical activity as a key component within interventions designed to support individuals who have become connected with, or are vulnerable to, engagement in the criminal justice system (Meek, 2018; Norman et al., 2024). Despite growing evidence to support the instrumental use of sport and physical activity within such interventions, both in custodial and in community settings (Morgan and Parker, 2023), there remain significant misconceptions regarding the ‘power of sport’ to prevent and/or divert engagement with crime or support efforts to rehabilitate and address reoffending. These misconceptions are largely based on assumptions regarding the ‘life lessons’ that (automatically and universally) transfer from the sport domain to other contexts. However, the evidence is clear that there are other key mechanisms in play, beyond participation, that enable sport and physical activity interventions to impact criminal justice outcomes. The aim of this paper is to introduce some of the mechanisms that have been identified in previous research which contribute to the effective implementation of sport-based criminal justice interventions. In addition, since there has been relatively limited academic consideration of how sport and physical activity might be integrated into policy and practice around probation and resettlement, the paper offers suggestions for how these mechanisms may be integrated into efforts to support probation and youth justice services.

Manchester, UK:  HM Inspectorate of Probation. 2024, 14pg

Living in Gang-Controlled Neighborhoods: Impacts on Electoral and Nonelectoral Participation in El Salvador

By Abby Córdova

Gangs’ territorial control affects the lives of residents in thousands of neighborhoods across Latin America, particularly in northern Central American countries. I argue that gang dominance constrains the ability of neighborhood residents to mobilize politically and consequently resist gang violence through institutionalized channels. Living in gang-controlled neighborhoods results in fewer incentives and opportunities to make political elites accountable for one’s personal safety. Even residents who have already experienced crime firsthand are discouraged from turning to politics as a strategy to change the status quo. My theoretical insights identify mechanisms through which gangs’ neighborhood control affects nonelectoral and electoral participation. To test my hypotheses, I rely on census and public opinion data collected in seventy-one neighborhoods in El Salvador. This article offers the first systematic statistical analysis of the effect of gangs’ territorial control on political participation in the Latin American context. The findings suggest that living under gang rule undermines residents’ right to engage freely in politics in nuanced ways.

Latin American Research Review. 2019;54(1):201-221. doi:10.25222/larr.387

Guest User
The Armed Arena: Arms Trafficking in Central America

By Mark Ungar

To explain the high rates of violence in Central America’s Northern Triangle, this article argues that it is rooted in an armed arena comprised of state and nonstate actors with roles in security, ranging from the military to organized crime. In this space of collaboration, those actors bring resources and reap rewards, strengthening their relationships in the process. Of the many activities within the armed arena, one of the most destructive is the trafficking of firearms. Based on fieldwork in Honduras, Guatemala, and El Salvador, this article focuses on two sets of relationships that demonstrate the armed arena’s strength. The first set is the area of criminal justice, centered on investigations, ballistics, inventories, and destruction of arms. The second is the arms market: regional trafficking, internal arms sales, and the state’s licensing system. Evaluating governmental responses, the final section shows that arms control policies are most effective when they target and disrupt these relationships.

Latin American Research Review (2020) 55(3) 445-460

Guest User
User experiences of reporting dating app facilitated sexual violence to dating platforms

By Siobhan Lawler and Hayley Boxall

A significant proportion of users subjected to dating app facilitated sexual violence (DAFSV) make a report to the platform. However, the experiences of victim-survivors reporting to dating platforms has been underexamined in research.

Based on the analysis of a survey completed by 1,555 dating platform users in Australia who had reported DAFSV to the platform, this study found overall positive experiences reporting to platforms. However, victim-survivors’ experiences differed depending on their gender and sexual identity; LGB+ women reported the lowest levels of satisfaction with platforms’ responses, and heterosexual men the highest.

Further, respondents who were satisfied with how platforms responded to their reports of DAFSV were more likely to say that they would report again in the future. Respondents who said that the dating platform had provided them with information about other services were also more likely to report the incident to the police.

 Trends & issues in crime and criminal justice no. 688. 

Canberra: Australian Institute of Criminology. 2024. 17p.

Guest User
Brazilian prisons in times of mass incarceration: Ambivalent transformations

By Luiz Dal Santo

Most of the scholarship on the ‘punitive turn’ has claimed that there have been two main trends in punishment since the 1970s: the rise of incarceration rates (quantitative dimension) and the worsening of prison conditions (qualitative dimension). Scholars argue that, in parallel with the rise of mass incarceration, there has been a fall of the rehabilitative ideal. In this view, prisons in core countries have basically operated as a warehouse, working towards neutralisation and incapacitation. Both trends are also viewed as reflecting a global convergence of penal policies. The analysis of the Brazilian case challenges this supposed universality. Drawing on official prison data, reports from non-governmental organisations, and secondary data, I argue that mass incarceration has not been accompanied by the same qualitative changes to prisons in ‘Western countries’ and Brazil. First, features of the so-called warehouse prison, such as low levels of prison activities, have always been present in Brazilian prisons, and are not an effect of mass incarceration. Furthermore, the consequences of mass incarceration in Brazilian prisons have, in fact, been ambivalent and, in some cases, may have alleviated inmates’ suffering, rather than intensifying experiences of confinement. Finally, instead of neutralising and controlling criminals, Brazilian prisons under mass incarceration have contributed to the emergence, empowerment, recruitment and organisation of gangs, whose powers now transcend the physical barriers of prison walls.

The Howard Journal of Crime and Justice, Volume 61, Issue4 December 2022 Pages 502-518

Guest User
Video visitation in Australian prisons: Perspectives on father–child contact

By Natalia Hanley,  Elisabeth Duursma, Amy Conley Wright, Helen Simpson and Laura Metcalfe

Family visits for people in Australian correctional centres stopped during the COVID-19 pandemic. Video visitation was introduced in most jurisdictions as an alternative option. This paper presents the findings from the first multi-jurisdictional study to explore the experiences and impacts of video visits between fathers in prison and their children. Findings show that there are significant benefits to video visitation for fathers, children and children’s carers, and corrective services. However, video visits are most beneficial as a complement, not alternative, to contact visits. There are opportunities to develop support for fathers and carers by focusing on visit quality.

Trends & issues in crime and criminal justice no. 683. 

Canberra: Australian Institute of Criminology, 2024. 14p.

Guest User
Outlaw motorcycle gangs and their members' crime: Examining the social organization of crime and its relationship to formal club hierarchy

By Sjoukje van Deuren, Edward Kleemans, and Arjan Blokland

  In recent years, many European countries have taken far-reaching measures to combat the criminal activities of outlaw motorcycle gangs (OMCGs). Meanwhile, empirical research into the ways OMCGs are involved in and influence the crimes of their members is largely lacking. This study presents the main findings of research based on police files of cases that were filed against members of Dutch OMCGs. We apply a criminological scenario approach to analyse to what extent and in which ways OMCGs are involved in the crimes of their members. The results show that OMCG membership particularly plays an indirect role in the criminal behaviour of OMCG members. Board members, for example, give permission for criminal acts, regulate mutual relationships between members, non-members and rival OMCGs during conflict situations, and forbid (criminal) behaviour of members that is harmful to the OMCG. OMCGs function as a pool of co-offenders and as a market for criminal enterprises. Members also use the violent reputation of OMCGs in specific criminal activities. OMCGs are less frequently directly involved in crimes. Direct involvement of OMCGs is most apparent in organized inter-gang violence and violence against their own members.

European Journal of Criminology 19(6) , 2020.

Guest User
Viral marketing: Counterfeits, substandard goods and intellectual property crime in the COVID-19 pandemic

By Euroopol

  Counterfeit goods sold during the corona crisis do not meet the required quality standards and pose a real threat to public health and safety. People who buy these fake products have a false sense of security, while they are in fact left unprotected against the virus. Therefore, we should not only go after the criminals behind these scams, but also, through prevention work, inform potential victims who are putting themselves and others at risk by using such fake goods.

Europol has been monitoring the activities of counterfeiters during the ongoing COVID-19 pandemic since the beginning of the current crisis and can present an updated threat picture. The threat from counterfeit products related to COVID-19, especially those aimed at the healthcare sector, emerged quickly and created a notable impact. However, this threat is likely to subside once the current unique situation and its circumstances have passed. 

The Hague: Europol, 2020. 17p.

Guest User
Vessel protection against piracy in the Gulf of Guinea: a public private hybrid

By Jessica Larsen & Stephanie Schandorf

According to the 1982 UN Convention on the Law of the Sea, only state vessels are mandated to combat maritime piracy. However, private security companies supplement state efforts to protect seafarers and ensure freedom of navigation in piracy-prone regions. This is particularly the case in the western Indian Ocean and the Gulf of Guinea: Private vessel protection rocketed in the 2010s, when piracy disturbed the freedom of navigation of vessels transiting the vital chokepoint for international trade in the Indian Ocean. In this theatre, no ships with armed guards onboard were ever successfully hijacked, and private protection was deemed largely effective.

In the Gulf of Guinea, the situation is different both legally and geographically. As Denmark has an estimated 30-40 vessels within the Gulf of Guinea at any given point, this calls for renewed consideration of how to manage private security operations at sea.

Copenhagen: DIIS - Danish Institute for International Studies, 2024. 4p.

Guest User
Women on the move: Trafficking, sex work and reproductive health among West African migrant women

By  Sine Plambech, Ahlam Chemlali,  and Maria Chiara Cerio

Themes as labour migration, trafficking, sex work, debt and reproductive health, are often tackled separately, but the reality experienced by women on the move shows that they are much more intertwined than it might seem.

This new DIIS Report aims at exploring these connections bringing to the core of the conversation the first-hand experience of migrant women from West Africa. Fifty-one women are interviewed at different points of their journeys from Nigeria and Ivory Coast through Niger, Tunisia, Libya, across the Mediterranean to Italy and onwards to Northern Europe.

Anchored in critical trafficking studies, the report draws on a trafficking-migration continuum to understand how categories of forced, voluntary or irregular migration will vary according to political and moral values. The women interviewed in this study did not define themselves as trafficked, but as women looking for safety and business opportunities. Taking into consideration their personal and individual stories allow us to overcome the invisibility of migrant women usually depicted as just victims of trafficking or criminals crossing European borders, and understanding them as agent with an active role in their migratory experience.

Irregular migrant women face several vulnerabilities as heightened levels of gender-based violence en route, including rape, maternal mortality and limited access to contraception and pregnancy termination. Migrant women en route implement harm reduction strategies to address these vulnerabilities and ultimately survive. Often this implies relying on dangerous and quick solutions and avoiding professional medical assistance or humanitarian aid, due to their fear of being deported or arrested.

Based on the stories and experiences of migrant women and practitioners, this report seeks to develop doable solutions to make this migratory path safer. It speaks directly to NGOs and practitioners in terms of implementing accessible spaces for women and girls’ specific needs, to health and medical organisations in order to provide reproductive health services in numerous points of the journey and finally to policy makers in the hope of bank and debt, sex work and migration policies reforms.

Copenhagen:  DIIS · Danish Institute for International Studies, 2022. 72p.

Registration and management of sex offenders

By Jacqueline Beard    

  Part 2 of the Sexual Offences Act 2003 provides various measures that enable the police in England and Wales to monitor and manage sex offenders living in the local area. Notification requirements: The “sex offenders register” Certain sex offenders are required to notify the police of personal information such as their name, address and bank and credit card details, and to update the police whenever this information changes. The police record of this information is commonly referred to as the “sex offenders register”. There is no general public access to the “sex offenders register”. The child sex offender disclosure scheme allows parents, carers and guardians to formally ask the police to tell them if someone has a record for child sexual offences. The notification requirements are imposed automatically on offenders convicted of certain offences in the UK but can also be imposed on offenders convicted overseas. The notification requirements are imposed for a fixed or indefinite period, depending on the sentence received. The penalties for breaching notification requirements range from a fine to imprisonment for up to five years. Those offenders subject to an indefinite notification period can apply to the police for a determination that they no longer pose a risk and should no longer be on the register. The earliest point at which such an application can be made is 15 years after the date of the offender’s first notification (or eight years, for those aged under 18 when convicted). Sexual Harm Prevention Orders and Sexual Risk Orders There are two civil orders available to manage sex offenders and those who pose a risk of harm: Sexual Harm Prevention Orders (SHPOs) and Sexual Risk Orders (SROs). These orders can place a range of restrictions and/or positive requirements on individuals depending on the nature of the case, such as limiting their internet use or preventing travel abroad. The penalties for breach range from a fine to imprisonment for up to five years. Details can be found in the Home Office, Guidance on Part 2 of the Sexual Offences Act 2003, November 2022.  

London: House of Commons Library, 2023. 23p.

Cybersecurity in Brazil: an analysis of the National Strategy

By Louise Marie Hurel

  In February 2020, the Decree 10.222 established Brazil’s National Cybersecurity Strategy (E-Ciber) — the first official document to provide an overview regarding Brazil’s role in cybersecurity, as well as objectives and guiding principles for its development between 2020 and 2023. With the Covid-19 pandemic, thousands of people, governmental agencies, and businesses have rapidly adapted their activities to a largely virtual environment. This sudden migration led to new threats and attack surfaces for exploiting vulnerabilities. More than ever, different sectors must be prepared and trained to respond to and resist these threats. However, this was precisely the period in which Brazil suffered the worst cyber attack in its history – highlighting, yet again, that many challenges remain for ensuring that concerns with security turn into action across different sectors. This strategic paper identifies the main gaps and challenges for cybersecurity governance in Brazil. We unpack the main elements of E-Ciber in order to understand and place the country’s strategic vision historically as well as in relation to other international experiences. We adopt a principlesbased approach that seeks to strengthen and inform the implementation of strategic cybersecurity objectives in Brazil, which include: national and international coordination and cooperation; knowledge integration; sustainability of efforts; and cybersecurity-related training. 1 See Annex 1 for greater detail on the various challenges. This document is the result of three months of interviews with specialists from various sectors, thematic document analysis, and ethnographic work in different areas, forums, and debates. Challenges identified in interviews and field work include:1 (i) The absence of a shared vocabulary when referring to cybersecurity/digital issues in society; (ii) The association of cybersecurity with military affairs, responsibilities and institutions; (iii) Lack of understanding regarding specific and shared digital risks across sectors; (iv) The absence of mechanisms for sharing information regarding security risks/threats and knowledge across sectors; (v) Lack of normative, strategic, and operational alignment for incident response; and (vi) (vi)The existence of various cybersecurity maturity levels throughout society

Brazil: Igarape Institute, 2021. 43p.

PRISON POPULISM IN LATIN AMERICA STRATEGIC. Reviewing the Dynamics of Prison Population Growth

By Carlos Vilalta and Gustavo Fondevila 

Not much information can be found on the size and trends of the prison population in Latin America. Over the past few years, our knowledge base has started to increase. Now we know, with certainty, that prison populations have been growing much faster than the general population, and that their living conditions are extremely harsh. 3 Thus it should not surprise us when we often hear of deadly prison riots happening in countries like Brazil, Venezuela, and Mexico, as a consequence of overcrowding and poor living conditions. Although living conditions in prisons in the region are still appalling, rapid growth seems to have come to an end. Trend data suggests that the Latin American prison population rate has stabilized. The objective of this study is to offer a data driven review of the growth, trends, and the principle reasons behind the rapid expansion of the prison population in the region during the past two decades. A key factor appears to be  the rise of prison populism. We do not provide an argument for the recent decrease in the growth rate, it is too early to determine whether the recent slow-down in prison population growth is due to a regime shift in the time series, or the effect of random variation. Still, ceteris paribus, we provide a projection of the prison population rate for the region. This Strategic Note fills a gap in the literature. Our particular contribution consists of the compilation of quantitative data of the region´s prison population, with the purpose of providing a broad but novel overview of the rapid growth and challenges to a wide audience of researchers and practitioners worldwide. 

Brazil: Igarape Institute, 2019. 16p.

Ringer Was Used to Make the Killing”: Horse Painting and Racetrack Corruption in the Early Depression-Era War on Crime.

By Vivian Miller

Peter Christian "Paddy" Barrie was a seasoned fraudster who transferred his horse doping and horse substitution skills from British to North American racetracks in the 1920s. His thoroughbred ringers were entered in elite races to guarantee winnings for syndicates and betting rings in the prohibition-era United States. This case study of a professional travelling criminal and the challenges he posed for the Pinkerton National Detective Agency in the early 1930s war on crime highlights both the importance of illegal betting to urban mobsters and the need for broader and more nuanced critiques of Depression-era organised crime activities and alliances.

Journal of American Studies, 2021. 35p.

Respectable White Ladies, Wayward Girls, and Telephone Thieves in Miami’s “Case of the Clinking Brassieres”

By Vivien Miller 

This essay uses the 1950 “case of the clinking brassieres” to explore female theft in Miami at mid-century and the ways in which gender, race, class, respectability, and youth offered protections and shaped treatment within Florida’s criminal justice system. It focuses on the illegal activities of three female telephone employees, their criminal prosecution, and post-conviction relief. These seemingly respectable coin thieves challenged a familiar image of theft as a lower-class crime associated with poverty and economic need, while their blonde hair and white skin (and an idealization of the meanings of white beauty standards), complicated public attitudes in a period when “true” or serious criminals were racketeers and organised crime operatives.

European Social Science History Conference, 2013. 39p.

Countering Counterfeits: The Real Threat of Fake Products How Fake Products Harm Manufacturers, Consumers and Public Health—and How to Solve This Problem 

By The National Association of Manufacturers

Amid an unprecedented global health crisis, manufacturers have stepped up and taken the lead, working together and with national, state and local governments to fight the spread of COVID-19. Manufacturers deliver day-to-day necessities, lifesaving medical innovations and products that improve people’s lives in countless ways. While the pandemic has demonstrated anew the importance of American innovation and ingenuity, it has also revealed a serious threat: counterfeit products that put lives and livelihoods at risk. Counterfeiting is not a new problem; it has harmed manufacturers, American workers and consumers for years. But the problem is getting worse, and the COVID-19 pandemic has shown just how dangerous inaction can be. As part of the nation’s critical response effort, manufacturers have been supplying health care workers and other Americans on the front lines of this crisis with vital goods, including personal protective equipment, hospital beds, ventilators, hand sanitizers, cleaning supplies and other critical health care and safety products. But while manufacturing men and women work long hours to ramp up production of desperately needed products to fight the spread of this deadly illness, counterfeiters have exploited the crisis to peddle fake tests, dangerous vaccines and ineffective protective gear. These counterfeits are harming American citizens and hindering manufacturers’ efforts to protect their workers and communities. The prevalence of counterfeits in the COVID-19 response has brought new urgency to this long-simmering issue. So the National Association of Manufacturers is leading the charge against fake and counterfeit goods, bringing together diverse stakeholders and driving innovative policy solutions to address these issues once and for all and to ensure the long-term success of our sector and the safety and security of the people who rely on our products. 

Washington, DC: National Association of Manufacturers, 2020.  21p.

 The Impact of Organized Retail and Product Theft in the United States

By John Dunham & Associates

The Retail Industry Leaders Association (RILA) is the US trade association for retailers that have earned leadership status by virtue of their sales volume, innovation, or aspiration. The Buy Safe America Coalition (BSA) represents a diverse group of responsible retailers, consumer groups, manufacturers, intellectual property advocates and law enforcement officials who support efforts at all levels of government to protect consumers and communities from the sale of counterfeit and stolen goods. One important issue facing US retailers is the growth in the availability and sales of illicit products, both from counterfeit imports and from products stolen from legitimate retailers. These products are increasingly sold online through third-party marketplaces. RILA and BSA asked John Dunham & Associates (JDA) to examine the data around these illicit sales to determine how they impact the US economy, federal tax revenues, and criminal activity. This is the second in a series of papers examining the issue of organized retail crime (ORC), and its effect on the United States economy. This analysis will focus on product theft from brick-and- mortar retailers and the rise of organized theft operations that fence illegally obtained goods to consumers, increasingly online. While this paper focuses solely on those goods stolen from retail locations, there is a growing problem with consumer goods being stolen from containers and trucks as the supply chain has backed up in recent months. For the purpose of this analysis, cargo theft was not included. According to the analysis: • As much as $68.9 billion worth of products were stolen from retailers in 2019. This represents about 1.5 percent of total retail sales. • Law enforcement and retail asset protection officials have found that the availability of anonymous online marketplaces has provided an easy way to sell stolen goods, and that the growth of these marketplaces coincides with a recent surge in organized retail crime that puts both employees and customers in harm’s way. • Academic research has suggested that most retail theft represent crimes of opportunity. In other words, people steal when it is easy to do so. Other causes include poor economic conditions, and dissatisfaction among workers. However, professionals in the field identify the availability of anonymous on-line marketplaces as ways to easily fence goods, and prosecutorial changes as being major factors contributing to the growth in ORC. • The growth in on-line marketplaces is highly correlated (61 percent) to the number of shoplifting events reported each year. • In addition, those retail categories most subject to shoplifting activities are also the ones most sought after through on-line marketplaces. • Nearly 67 percent of asset protection managers at leading retailers surveyed report a moderate to considerable increase in organized retail crime, while 80 percent believe it will only get worse in the future.  The economic impact of retail crime is profound. Retailers face increased costs for lost product, security, and labor, which lead to higher prices for consumers and ultimately, lower sales. Lower sales translate to fewer jobs throughout the economy. The result is $125.7 billion in lost economic activity and 658,375 fewer jobs, paying almost $39.3 billion in wages and benefits to workers. • Retail theft is not a problem just in major metropolitan areas, it is pervasive across America. In fact, one factor that is associated with lower levels of retail theft is the density of retail locations. • The impact of theft is felt through higher prices, and this impact is more acutely felt by low- and middle-income families. • It is estimated that retail theft costs federal and state governments nearly $15 billion in personal and business tax revenues, not including the lost sales taxes.

Washington DC: Retail Industry Leaders Association (RILA) ;  Washington, DC:  Buy Safe American Coalition, 75p.

The Counterfeit Silk Road - Impact of Counterfeit Consumer Products Smuggled into the United States

By John Dunham & Associate

  The Buy Safe America Coalition represents a diverse group of responsible retailers, consumer groups, manufacturers, intellectual property advocates and law enforcement officials who support efforts at all levels of government to protect consumers and communities from the sale of counterfeit and stolen goods. One important issue facing US businesses is the massive growth in the availability and sales of illicit products, both from counterfeit imports — increasingly from China — and from products stolen from legitimate retailers and sold through online marketplaces, where the anonymity of a screenname has made it easier and more profitable to fence counterfeit and stolen goods. The Coalition asked John Dunham & Associates (JDA) to examine the data around these illicit sales to determine how they impact the US economy, federal tax revenues, and criminal activity. This is the first of a series of papers examining the issue of counterfeit and stolen goods and its effect on the United States economy. This analysis will focus on the importation of illicit products, notably counterfeits that violate producers’ intellectual property rights. Future analysis will examine the effects of domestic smuggling, the resale of stolen goods, and the effects of contraband on overall criminal activity. According to the analysis: • A large share of contraband items are delivered to US consumers by mail or by express consignment. These transactions account for over 60.8 percent of all seizures by the US customs service and over 90 percent of intellectual property rights (IPR) seizures. The growth in these types of shipments has increased along with the use of online marketplaces. Amazon, for instance, now derives more than 75 percent of their ecommerce revenue from marketplace sales. • In effect, as companies like the Chinese ecommerce marketplace Alibaba and the Amazon marketplace, have linked more consumers to more shippers, many companies producing illegitimate products have gained access to unwitting consumers in America. • The bulk of counterfeit products to the US come from China and its dependent territories, accounting for over 90.6 percent of all cargo with IPR violations. Of the $1.23 billion in total IPR violations intercepted, $1.12 billion was from China. • Examining just those data where CBP can provide an HS code, in some cases, the amount of contraband cargo is nearly equal to the entire import base. For example, imports of certain sweaters, jumpsuits and toys from China are almost 100 percent contraband, as are large amounts of handbags, jewelry and belts. • While there is substantial academic literature on the smuggling of narcotics, people and tobacco, there is very little written on counterfeit products. Using a very conservative model it is estimated that $44.3 billion in additional illicit cargo is escaping detection. • These lost sales alone mean that over 39,860 jobs in wholesaling and nearly 283,400 retail jobs are lost due to the impact of counterfeit goods skirting normal trade channels. All told, the sale of counterfeit items is expected to cost the wholesale and retail sectors of the US economy nearly 653,450 full-time equivalent jobs that pay over $33.6 billion in wages and benefits to US workers. • It is estimated that the smuggling of counterfeit goods costs the US government nearly $7.2 billion in personal and business tax revenues alone. • This analysis is based on the current level of CBP intercepts of illicit cargo. It is likely that the number of illegal imports is much larger than even estimated here.  

Washington, DC: Buy Safe America Coalition, 2021. 25p.

Geographical Aspects of Cybercrime: A Literature Review

By Craig S Wright

Cybercrime has become a pervasive and complex issue in today’s interconnected world, posing significant threats to individuals, businesses, and governments. This paper aims to provide a comprehensive overview of the diverse aspects related to cybercrime, including its historical context, demographic and geographic dimensions, environmental influences, and preventive strategies. This review provides a holistic overview of the multifaceted dimensions of cybercrime. By understanding its historical context, demographic and geographic aspects, environmental influences, and preventive strategies, policymakers, law enforcement agencies, and researchers can work collaboratively to combat cyber threats effectively. Such a comprehensive approach will help create a safer digital environment and protect individuals, organizations, and societies from the adverse impacts of cybercrime. Moreover, through ongoing research and collaboration, it is possible to develop innovative solutions and adapt to the evolving landscape of cyber threats, ensuring a secure and resilient digital future.

Unpublished paper, 2023. 54p.

The “Webification” of Jihadism: Trends in the Use of Online Platforms, Before and After Attacks by Violent Extremists in Nigeria

By Folahanmi Aina and John Sunday Ojo

Violent extremist organisations (VEOs) use social media platforms to promote extremist content and coordinate agendas.  The use of digital platforms to disseminate information and coordinate activities by VEOs in Nigeria has grown considerably in recent years. This report analyses the adoption of social media before and after attacks by Boko Haram, Islamic State of West Africa Province (ISWAP) and Ansaru. In the post-attack environment, Boko Haram, ISWAP and Ansaru use platforms to claim responsibility and display their strengths against the state’s security forces. By demonstrating their capacity to attack state security forces, the three groups aim to erode the public’s confidence in the state military’s capacity to safeguard national security. The key findings of this report are as follows: Boko Haram, ISWAP and Ansaru previously leveraged popular social media platforms, including YouTube, Facebook, Telegram and Instagram. These platforms were used to promote propaganda and create awareness regarding upcoming attacks. However, all three groups have now had their use of these platforms restricted or banned. ISWAP has switched to using WhatsApp as a secure platform for communication before, during and after attacks. Rocket.Chat and Telegram have also been instrumental in ISWAP’s information dissemination. Boko Haram uses Telegram to share its activities in the pre-attack and post-attack environments. Ansaru has yet to appear on social media platforms due to its underground activities, which are hard to monitor. The recent acquisition of high-speed satellite internet has enhanced ISWAP’s communication with its audience and enabled coordinated attacks. Combating the exploitation of social media platform by VEOs requires a multidimensional approach. Effective collaboration with technology companies becomes imperative to identify extremist content. Building technological infrastructure for the state requires synergistic collaboration with the military and intelligence agencies to enable the removal of extremism from social media platforms. Devising multilingual and specialised algorithms to detect coded extremism messages and audio-visual content is essential for effective counter-extremism digital architecture. Investing in current technology through research and algorithm development must be prioritised to identify violent extremist content in Nigeria and beyond.

London: Global Network on Extremism & Technology, 2023. 30p.