Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Anti-trafficking Action, From dreams to debt and exploitation: the untold story of 11 trafficked workers in Serbia

By ASTRA – Anti-trafficking Action
  This report by ASTRA – Anti-Trafficking Action, details a suspected case of labour exploitation involving 11 Indian workers contracted by China Energy Engineering Group Tianjin Electric Power Construction Co. LTD's Belgrade branch in Zrenjanin, Serbia. ASTRA began assisting the workers in late January 2024 after being contacted by the workers. Within a month, on February 11th, the workers left Serbia abruptly. Despite the short timeframe, ASTRA collected significant evidence, including documents, footage, and testimonials from the workers. This report, available in both a short and longer version, serves a dual purpose: I. Warning Sign: To highlight concerning practices towards migrant workers seeking decent employment in Serbia. II. State Response Evaluation: To assess the state institutions' reactions or lack thereof regarding this case. This incident reflects a broader trend. Similar cases involving foreign workers have emerged in Serbia over the past five years, often sharing common recruitment and employment elements. These cases also reveal evolving trends in exploitation methods and concerning gaps in the state's response. Serbia's growing foreign workforce requires a clear, competent framework to address human and labour rights violations effectively, for both foreign and domestic workers.

Belgrade, Republic of Serbia, ASTRA, 2024. 36p. 

Read-Me.Org
Justice Data Lab analysis: Reoffending behaviour after support from HMPPS CFO (6th analysis)

By  UK Ministry of Justice Justice Data Lab team 

  This analysis looked at the reoffending behaviour of men and women who participated in His Majesty’s Prison and Probation Service’s (HMPPS) Creating Future Opportunities (CFO) programme some time between 2015 and 2021 (concluding in or after August 2018). The overall results show that men who took part in the programme in the community were less likely to reoffend, reoffended less frequently and took longer to reoffend than those who did not take part. These results were statistically significant. A previous analysis was published in July 2019, covering a separate cohort and a variation of the programme. This can be found in the Justice Data Lab statistics collection on GOV.UK. HMPPS CFO intervention is based on one-to-one case management, with the aim of increasing the employability of participants. The programme operates in three settings: in the community, in custody and through the gate (TTG). The headline analysis in this report measured proven reoffences in a one-year period for a ‘treatment group’ of 3,520 male offenders who began receiving support in the community some time between 2015 and 2021 (concluding in or after August 2018), and for a much larger ‘comparison group’ of similar offenders who did not receive it. The analysis estimates the impact of the support from HMPPS CFO on reoffending behaviour. Additional analyses were also conducted on male and female participants who received support from HMPPS CFO in each of the settings outlined above.  

London: Ministry of Justice, 2024. 20p.  

Read-Me.Org
Hiding in Plain Sight - The Transnational Right-Wing Extremist Active Club Network

By Alexander Ritzmann

  This report analyzes the potential threats affiliated with the largest and fast growing transnational right-wing extremist (RWE/REMVE) combat sports network, called Active Clubs. It explores the objectives, strategies, strengths, and weaknesses of this network, which has spread from the U.S. to Canada and to at least 14 countries in Europe within three years. ● The overall objective of the Active Club White Supremacy 3.0 strategy is the creation of a stand-by militia of trained and capable RWE/REMVE individuals who can be activated when the need for coordinated violent action on a larger scale arises. ● Over 100 Active Clubs have been created between late 2020 and August 2023, with at least 46 in the United States across 34 U.S. states. At least 46 Active Clubs exist in 14 European countries, and 12 in Canada. The estimated number of members per Active Club is between five and 25. ● Some Active Clubs in the U.S. are conducting or participating in military-style tactical and casualty care trainings. Members or sympathizers of Active Clubs in France and Estonia appear to be fighting in the Russia-Ukraine war. ● If Active Clubs are allowed to continue to operate and multiply, the likelihood for targeted political violence and terrorism by their members against supposed enemies of the “white race” (e.g., Jews, people of color, Muslims, and LGTBQI+ people) will increase. ● A key component of the White Supremacy 3.0 strategy is to hide in plain sight. To avoid, delay, mitigate, or withstand law enforcement interventions, Active Clubs are supposed to present a friendly face to the public. Consequently, network members are asked to avoid threatening behavior or displaying obvious Nazi symbols to appear less relevant to law enforcement. This less aggressive and more mainstream strategy is also meant to help grow the network, in particular from the general public. ● For the Active Club strategy of hiding in plain sight to work, members should look like regular guys, like the members of the (NSDAP Schutzstaffel) SS did. When recruiting, Active Club members should not talk about Jews and history. Instead, the focus in public should be on brotherhood, community, fitness, and self-defense. 

 Berlin:  Counter Extremism Project (CEP), 2023. 52p. 

Read-Me.Org
Informal Economy Perspectives on the Prevalence of Worst Forms of Child Labour in Bangladesh’s Leather Industry

By  A.K.M. Maksud, Khandaker Reaz Hossain, Sayma Sayed and Jody Aked 

The CLARISSA programme aims to understand the dynamics that are central to running a business in the informal economy in Bangladesh’s leather industry and explore how and why worst forms of child labour become a feature of business operations. This research paper explores the findings from semi-structured interviews with business owners operating enterprises involved in leather processing and production across three prominent neighbourhoods and business districts in and around Dhaka. A focus on the leather industry in Bangladesh is an opportunity to explore the demand side of the child labour issue in a situated way, with the intention of bringing the lived experience of business owners to pre-existing literature on poverty entrepreneurship, supply chain governance, and political economy. The paper details the risks and stressors business owners face, the relationships they have with other informal and formal enterprises in the supply chain system, and their rationale for hiring children. Business owners experience poverty and financial precarity, taking significant financial risks to sustain enterprises that are barely viable economically. Stuck in vicious operating cycles, on ‘produce now, pay later’ credit arrangements, enterprises respond by squeezing labour budgets. The need for cheap labour is amplified by price points at lower than the cost of production. To understand why child labour has been so difficult to ‘end’, an informal economy business perspective points to the economic dysfunction of complex supply chains, particularly mediated by downward financial pressures produced and reproduced by highly fragmented manufacturing processes in cost-driven markets. When poverty and precarity among informal economy business owners intersects with formal economy power, the result is business models that rely on children as cheap labour. The findings make clear the policy value of engaging business owners in the informal economy in efforts to reduce worst forms of child labour, especially given the insights they can offer about how, when, and why supply chain systems are at risk of depending on children for the provision of goods and services.

  CLARISSA Research and Evidence Paper 8, 

Brighton: Institute of Development Studies, 2024. 54p.

Read-Me.Org
Fentanyl, carfentanil and other fentanyl analogues in Canada’s illicit opioid supply: A cross-sectional study

By Robert A. Kleinman

Background

Despite the increase in fentanyl-involved overdose deaths in Canada, there have been no national-level studies evaluating the proportion of illicit opioids containing fentanyl or fentanyl analogues in Canada.

Methods

This cross-sectional exploratory study characterized trends in fentanyl, carfentanil and other fentanyl analogues within opioids seized by law enforcement agencies in Canada from 2012 to 2022 and submitted to the Health Canada Drug Analysis Service (DAS). Analyses were stratified by province/region. Mann-Kandell tests were used to test for trends.

Results

A total of 157,616 samples containing any opioid (“opioid-containing samples”) were submitted to the DAS from Canadian provinces between 2012 and 2022, of which 81,165 (51.5%) contained fentanyl or a fentanyl analogue. The percentage of opioid-containing samples that were positive for fentanyl or a fentanyl analogue increased from 3.0% (95% CI: 2.6-3.4%) in 2012 to 68.3% (67.7-68.9%) in 2022 (p < 0.001 for trend). The percentage of opioid-containing samples that were positive for fentanyl or a fentanyl analogue increased between 2012 and 2022 in all regions. In 2022, the percentage of samples containing fentanyl or an analogue followed an east-to-west gradient: 15.8% (13.3-18.6%) of samples in Atlantic Canada and 84.7% (83.6-85.7%) in British Columbia. Carfentanil was present in 4.9% (4.6-5.2%) of opioid-containing samples in Canada in 2022 and 19.7% (18.3-21.2%) of opioid-containing samples in Alberta.

Conclusions

The illicit opioid supply in Canada increasingly contains toxic synthetic opioids. As of 2022, important regional differences existed in the illicit opioid supply in Canada.

   Drug and Alcohol Dependence Reports, (2024)

Read-Me.Org
The Generals’ Labyrinth: Crime and the Military in Mexico

By The International Crisis Group

  Outgoing Mexican President Andrés Manuel López Obrador has deployed troops on a scale never seen before to fight crime across the country, but this measure has barely loosened the grip of illegal outfits. In some ways, the government can call its policy a success. Violence, measured by reported murders, has dipped from the historic heights of a few years ago, an achievement supporters attribute to the president’s incorruptible character. Polls suggest that his party’s candidate, Claudia Sheinbaum, will romp to victory in the 2 June election. But in the states hardest hit by crime, the reasons behind lulls in fighting appear less flattering to federal authorities. Some security officers and criminal leaders suggest that a modus vivendi between military commanders and illegal outfits has enabled crime groups to profit and expand their hold on communities so long as overt violence is curtailed. Mexico’s next president may be unable to withdraw troops from public security, but she should delineate limits to their role while endeavouring to sever state ties to crime and create the conditions for effective civilian law enforcement. After campaigning in 2018 on a platform promising to pacify Mexico, end the “war on drugs” and return troops to the barracks, López Obrador seemingly underwent a radical conversion. Even before he took office, the president declared that he could not trust the country’s various police forces to curb heavily armed criminal groups, opting instead to reinforce the role of the military – whose law enforcement capacities had been an article of faith for the previous two governments. López Obrador boosted troop deployment and created an entirely new security force under military leadership, the National Guard. In addition to expanding the military’s role in ensuring public safety, he also handed the armed forces major roles in infrastructure, migration control, and seaport and airport management. According to the 2024 budget, 20 percent of state spending is now being channelled through the armed forces. Top government officials insist that the president’s integrity – alongside the military's robust presence and a barrage of social programs – have served to dampen levels of armed conflict. On closer inspection, however, the areas most affected by warring criminal groups – including states such as Michoacán, Veracruz, Colima and Guerrero – have seen large military deployments but limited concrete crime fighting. Security force insiders and criminal leaders note that a set of largely unspoken rules has been established, encouraging illegal groups to reduce and conceal the violence they perpetrate. In exchange, authorities have turned a blind eye to a degree of illegality, enabling these organisations to diversify their trafficking operations (including into newer illicit drugs such as fentanyl), expand their extortion rackets, branch out into legal business, and assume greater control of communities and local governments. When these understandings fall apart, or when major criminal syndicates engage in frontal battle with one another, triggering humanitarian emergencies and drawing national media and political attention, the military are prone to take on a more interventionist and offensive role. But even then, they do not always focus on undermining criminal power, and they can be ambivalent toward illicit operations. When the Jalisco New Generation Cartel launched a major offensive in Michoacán, military    commanders are reported to have hatched deals with crime rings to fight the group, including a campaign to kill numerous members of the cartel. Elsewhere, military officers in cahoots with specific crime groups have allegedly abused their authority to shield their illegal partners. The misuse of authority in Mexico is not unique to the military. But the sheer extent of the armed forces’ security, political and budgetary powers, combined with the lack of any independent civilian oversight, reinforces the risks that members of the armed forces will engage in corruption and collusion. That said, a precipitous move to return soldiers to the barracks could destabilise areas plagued by crime groups locked in arms races and trigger political risks that neither of the main candidates seems willing to countenance. As the candidate for López Obrador’s party, Shein baum has defended the strategy of the past six years, saying the military should remain at the heart of public security for as long as needed. Her main adversary, Xóchitl Gálvez, representing a coalition of opposition parties, has advocated for pulling troops back from some of their many duties. But she concedes a continuing role for troops in tackling the most violent criminal outfits, and she appears ready to reinforce the National Guard, albeit under civilian command..........

Brussels, Belgium: ICG, 2024. 44p.

 Latin America Report N°106 | 24 May 2024  

Read-Me.Org
INFECTIOUS GREED: HOW DECEIT AND RISK CORRUPTED THE FINANCIAL MARKETS

MAY CONTAIN MARKUP

FRANK PARTNOY

In "Infectious Greed: How Deceit and Risk Corrupted the Financial Markets, delves into the intricate web of deceit and risk that has plagued the financial markets. This gripping exposé uncovers the various factors that led to the corruption and downfall of the financial sector, offering a stark look at the dark underbelly of greed and deception. Through meticulous research and compelling narratives, [author name] sheds light on the devastating consequences of unchecked avarice and manipulation within the realm of high finance. A must-read for anyone seeking to understand the forces at play behind some of the most notorious financial scandals in history.

Henry Holt and Company. New York. 2003. 470p.

Future Crimes: Inside The Digital Underground And The Battle For Our Connected World

MAY CONTAIN MARKUP

Marc Goodman

In "Future Crimes: Inside The Digital Underground And The Battle For Our Connected World," author Marc Goodman delves into the dark and complex world of cybercrime. He explores the ways in which technology has transformed criminal activities, from hacking and identity theft to cyberterrorism and digital espionage. Goodman sheds light on the threats that the digital age poses to individuals, organizations, and governments, urging readers to become more vigilant and informed about cybersecurity. Through detailed research and gripping real-life stories, "Future Crimes" offers a compelling and sobering look at the vulnerabilities of our interconnected world.

ANCHOR BOOKS. A Division of Penguin Random House LLC New York. 2016. 601p.

Digital Crime and Digital Terrorism

MAY CONTAIN MARKUP

ROBERT W. TAYLOR, TORY J.CAETI, D. KALL LOPER, ERIC J. FRITSCH, and JOHN LIEDERBACH

FROM THE PREFACE: “The first section of the book covers the etiology of the digital crime and digital terrorism problem. The focus in this section is on the types of crimes and acts of terrorism that are committed using computers, networks, and the Internet. Additionally, the reasons why offenders commit these types of crimes are examined in relation to current criminological theories and explanations. As the reader will find, applying criminological theory to digital crime and terrorism is a relatively recent conception. Finally, the section concludes with a chapter on digital criminals and hackers. Chapter I provides an introduction and overview of computer crime. In particular, a categorization of types of computer crimes is presented including I) the computer as the target, 2) the computer as an instrument of a crime, 3) the computer as incidental to crime, and 4) crimes associated with the prevalence of computers. Chapter 2 provides a definition and overview of two key areas of concern in regards to computer crimes, specifically "information warfare" and "cyber-terrorism." Chapter 3 reviews criminological theories that can explain digital crime. Since few theories have been applied directly to digital crime, this chapter focuses on the classic criminological theories that can be applied to digital crime. In other words, the theories discussed in this chapter were developed to explain crime in general, not digital crime specifically. In particular, this chapter focuses on choice, deterrence, psychological. social structure, and social process theories. Finally, Chapter 4 presents an overview of the hacker subculture and presents a typology of hacker types based on relative levels of skill, resources, and enculturation in the values of the hacker subculture. The chapter closes with a discussion of contemporary hacker roles and terminology.”

Prentice Hall. Upper Saddle River, New Jersey. 2006. 413p.

Black Finance: The Economics of Money Laundering

MAY CONTAIN MARKUP

Donato Masciandaro, EI6d Takats and Brigitte Unger

FROM THE INTRODUCTION: “Traditionally, monetary and financial economics has focused on legal financial transactions, while the economics of crime - following Becker - has neglected the financial aspects. Hence, black finance - finance that relates to illegal or criminal activities - has fallen between the two stools. Due to this separate development in the two sub-disciplines of economics, economic theory has not addressed financial crime sufficiently, so far. This creates a particularly disturbing gap in the literature, since lately, especially in connection with terrorist financing, the financial side of crime has become accentuated in the public and political debate.”

Edward Elgar. Cheltenham, UK • Northampton, MA, USA. 2007. 274p.

The Atlantic City Gamble

By George Sternlieb and James W. Hughes

FROM THE FOREWORD: “The quest for a quick and painless, that is, politically popular, means of raising funds and stimulating economic development never ends. In the last decade, politicians seized on a number of seemingly ingenious devices, from lotteries to off-track betting, that promised benefits such as big increases in revenues and decreases in the role of so-called organized crime. The results have rarely measured up to the expectations-the only thing painless about lotteries and betting shops is the way in which they have parted their clients from their money, and the only real benefits have been to the relatively few individuals who have hit large jackpots and the politicians who have found a new and rich source of patronage.”

Harvard University Press Cambridge, Massachusetts, and London, England. 1983. 224p.

MAY CONTAIN MARKUP

The Best Damn Cybercrime and Digital Forensics Book Period

MAY CONTAIN MARKUP

By Kevin Cardwell, Timothy Clinton, Tyler Cohen, Edward Collins, James "Jim" Cornell, Michael Cross, Larry Depew, Art Ehuan, Michael Gregg, Captain Benjamin R. Jean, Kevin O'Shea, Kevin Reis ,Anthony Reyes, Sondra Schneider ,Amber Schroader, Karen Schuler, Jesse Varsalone ,Jack Wiles and Craig Wright

INTRODUCTION: “As is often the case with security compromises, it's not a matter of if your company will be compromised, but when. If I had known the employee I hired was going to resign, break into my office, and damage my computers in the span of three days, hindsight being 20/20,I would have sent notification to the security guards at the front door placing them on high alert and made sure he was not granted access to the building after he resigned. Of course, I in hindsight, I should have done a better job of hiring critical personnel .He was hired as a computer security analyst and security hacker instructor; and was (or should have been) the best example of ethical conduct.

Clearly, we see only what we want to see when hiring staff and you won't know whether an employee is ethical until a compromise occurs. Even if my blinders had been off, I would have never seen this compromise coming. It boggles the mind to think that anyone would ruin or jeopardize his career in computer security for so little. But he did break into the building and he did damage our computers, and therefore he will be held accountable for his actions, as detailed in the following forensic information. Pay attention when the legal issues are reviewed.You will learn bits and pieces regarding how to make your life easier by knowing what you really need to know "when" your computer security compromise occurs.

Computer forensics is the preservation, identification, extraction, interpretation, and documentation of computer evidence. In Chapter 9 of Cyber Crime Investigations, digital forensics is referred to as "the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law"

Syngress Publishing. Inc. Elsevier, Inc.. Burlington, MA. 2007. 727p.

CCP's Role in the Fentanyl Crisis

UNITED STATES. CONGRESS. HOUSE. SELECT COMMITTEE ON THE STRATEGIC COMPETITION BETWEEN THE UNITED STATES AND THE CHINESE COMMUNIST PARTY

From the document: "The fentanyl crisis is one of the most horrific disasters that America has ever faced. On average, fentanyl kills over 200 Americans daily, the equivalent of a packed Boeing 737 crashing every single day. Fentanyl is the leading cause of death for Americans aged 18-45 and a leading cause in the historic drop in American life expectancy. It has led to millions more suffering from addiction and the destruction of countless families and communities. Beyond the United States, fentanyl and other mass-produced synthetic narcotics from the People's Republic of China (PRC) are devastating nations around the world. It is truly a global crisis. The PRC, under the leadership of the Chinese Communist Party (CCP), is the ultimate geographic source of the fentanyl crisis. Companies in China produce nearly all of illicit fentanyl precursors, the key ingredients that drive the global illicit fentanyl trade. The House Select Committee on the Strategic Competition between the United States and the Chinese Communist Party (Select Committee) launched an investigation to better understand the role of the CCP in the fentanyl crisis. This investigation involved delving deep into public PRC websites, analyzing PRC government documents, acquiring over 37,000 unique data points of PRC companies selling narcotics online through web scraping and data analytics, undercover communications with PRC drug trafficking companies, and consultations with experts in the public and private sectors, among other steps. [...] [T]he Select Committee found thousands of PRC companies openly selling [...] illicit materials on the Chinese internet--the most heavily surveilled country-wide network in the world. The CCP runs the most advanced techno-totalitarian state in human history that 'leave[s] criminals with nowhere to hide' and has the means to stop illicit fentanyl materials manufacturers, yet it has failed to pursue flagrant violations of its own laws."

UNITED STATES. CONGRESS. HOUSE. SELECT COMMITTEE. 16 APR, 2024. 64p.

Homeland Security Advisory Council, Combatting Online Child Sexual Exploitation and Abuse

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY

From the document: "On November 14, 2023, Secretary Mayorkas tasked the HSAC [Homeland Security Advisory Council] with forming a subcommittee on Combatting Online Child Sexual Exploitation and Abuse (CSEA) to develop the DHS strategy to protect community stakeholders from incidents of CSEA, consistent with the Department's authorities. To address these findings, the subcommittee makes the following six recommendations to DHS: 1. Establish, resource, and empower an office within DHS to lead Departmental efforts to counter online CSEA and form a center within DHS to organize a whole-of-government approach to addressing online abuse and exploitation. 2. Leverage existing tools; develop and advocate for policy solutions. 3. Increase participation in the combatting of CSEA by the major platform vendors. a. Build a uniform technology platform with a public private partnership for monitoring and reporting on all investigations, past and present, open and closed. This platform would be used as the system of record for all investing agencies. b. Reframe and realign incentives to partnership through legislative actions. 4. Prioritize vicarious trauma and workplace well-being support for law enforcement, civil society employees, and other frontline staff who encounter CSEA material in their work. 5. Bolster and sustain DHS external engagement for the Know2Protect Campaign by expanding resources and outreach with the Department of Education (ED). 6. Lead engagement with economic and regulatory federal partners to increase the interdepartmental approach to combatting CSEA."

HOMELAND SECURITY ADVISORY COUNCIL. COMBATTING ONLINE CHILD SEXUAL EXPLOITATION AND ABUSE SUBCOMMITTEE. 2024. 23p.

Social Inclusion from Below: The Perspectives of Street Gangs and Their Possible Effects on Declining Homicide Rates in Ecuador

By David C. Brotherton, and Follow Rafael Gude

Since 2007, the Ecuadorian approach to crime control has emphasized efforts to reach higher levels of social control based on policies of social inclusion and innovations in criminal justice and police reform. One innovative aspect of this approach was the decision to legalize a number of street gangs in 2007. The government claims the success of these policies can be seen in homicide rates that have fallen from 15.35 per 100,000 in 2011 to 5 per 100,000 in 2017. However, little is understood about the factors and their combination that have produced this outcome. To explore this phenomenon, we developed a research project focusing on the impact of street gangs involved in processes of social inclusion on violence reduction. From April to October 2017, we collected multiple data sets including 60 face-to-face interviews with members from four different street subcultures in several field sites, field observations and archival materials to answer two primary questions: How has the relationship between street groups and state agencies changed in the past 10 years? How has this changed relationship contributed to a hitherto unexamined role in the homicide reduction phenomenon of Ecuador? We found that legalization helped reduce violence and criminality drastically while providing a space, both culturally and legally, to transform the social capital of the gang into effective vehicles of behavioral change. In policy terms, we argue that the social inclusion approach to street gangs should be continued and highlighted as a model of best practices of the state.

Washington, DC: IDB, 2018.

Social Control and the Gang: Lessons from the Legalization of Street Gangs in Ecuador

 By David C. Brotherton · Rafael Gude

 In 2008, the Ecuadorian Government launched a policy to increase public safety as part of its “Citizens’ Revolution” (La Revolución Ciudadana). An innovative aspect of this policy was the legalization of the country’s largest street gangs. During the years 2016–2017, we conducted ethnographic research with these groups focusing on the impact of legalization as a form of social inclusion. We were guided by two research questions: (1) What changed between these groups and society? and (2) What changed within these groups? We completed field observations and sixty qualitative interviews with group members, as well as multiple formal and informal interviews with government advisors, police leaders and state actors related to the initiative. Our data show that the commitment to social citizenship had a major impact on gang-related violence and was a factor in reducing the nation’s homicide rate. The study provides an example of social control where the state is committed to policies of social inclusion while rejecting the dominant model of gang repression and social exclusion practiced throughout the Americas.  

Critical Criminology, 2020.

Thinking About Criminology

Edited by Simon Holdaway and Paul Rock

First published in 1998. Thinking about criminology draws together the expertise of respected criminologists from the principle contemporary schools of thought. The book aims to provide a clear analysis of the relationship between sociological theory and contemporary empirical criminological research, discussing the ways in which theoretical perspectives have contributed to the understanding of relevant criminal justice institutions, law and policy

London: Routledge, 1998. 220p.

Scarlet and Black: Slavery and Dispossession in Rutgers History

Edited by Marisa J. Fuentes and Deborah Gray White  

The 250th anniversary of the founding of Rutgers University is a perfect moment for the Rutgers community to reconcile its past, and acknowledge its role in the enslavement and debasement of African Americans and the disfranchisement and elimination of Native American people and culture. Scarlet and Black documents the history of Rutgers's connection to slavery, which was neither casual nor accidental-nor unusual. Like most early American colleges, Rutgers depended on slaves to build its campuses and serve its students and faculty; it depended on the sale of black people to fund its very existence. Men like John Henry Livingston, (Rutgers president from 1810-1824), the Reverend Philip Milledoler, (president of Rutgers from 1824-1840), Henry Rutgers, (trustee after whom the college is named), and Theodore Frelinghuysen, (Rutgers's seventh president), were among the most ardent anti-abolitionists in the mid-Atlantic. Scarlet and black are the colors Rutgers University uses to represent itself to the nation and world. They are the colors the athletes compete in, the graduates and administrators wear on celebratory occasions, and the colors that distinguish Rutgers from every other university in the United States. This book, however, uses these colors to signify something else: the blood that was spilled on the banks of the Raritan River by those dispossessed of their land and the bodies that labored unpaid and in bondage so that Rutgers could be built and sustained. The contributors to this volume offer this history as a usable one-not to tear down or weaken this very renowned, robust, and growing institution-but to strengthen it and help direct its course for the future. The work of the Committee on Enslaved and Disenfranchised Population in Rutgers History.

New Brunswick, NJ: Rutgers University Press, 2017. 222p.

Higher Powers: Alcohol and After in Uganda’s Capital City

By China Scherz,  George Mpanga, and Sarah Namirembe

Higher Powers draws on four years of collaborative fieldwork carried out with Ugandans working to reconstruct their lives after attempting to leave behind problematic alcohol use. Given the relatively recent introduction of biomedical ideas of alcoholism and addiction in Uganda, most of these people have used other therapeutic resources, including herbal aversion therapies, engagements with balubaale spirits, and forms of deliverance and spiritual warfare practiced in Pentecostal churches. While these methods are at times severe, they contain within them understandings of the self and practices of sociality that point away from models of addiction as a chronic relapsing brain disease and towards the possibility of release. Higher Powers offers a reconceptualization of addiction and recovery that may prove relevant well beyond Uganda.

Oakland, CA: University of California Press, 2024.  156p.

“Ringer Was Used to Make the Killing”: Horse Painting and Racetrack Corruption in the Early Depression-Era War on Crime.

 By Vivian Miller

Peter Christian "Paddy" Barrie was a seasoned fraudster who transferred his horse doping and horse substitution skills from British to North American racetracks in the 1920s. His thoroughbred ringers were entered in elite races to guarantee winnings for syndicates and betting rings in the prohibition-era United States. This case study of a professional travelling criminal and the challenges he posed for the Pinkerton National Detective Agency in the early 1930s war on crime highlights both the importance of illegal betting to urban mobsters and the need for broader and more nuanced critiques of Depression-era organised crime activities and alliances.

Cambridge, UK: Journal of American Studies, 2021. 22p.