Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

My Life as a Spy: Investigations in a Secret Police File

By Katherine Verdery

Surveillance and Identity: The author, Katherine Verdery, explores how being under surveillance by Romania's secret police during the Cold War affected her sense of identity and her work as an anthropologist.

Ethnography and Spying: The book delves into the similarities and differences between ethnographic research and spying, questioning the ethical implications of both practices.

Impact of Surveillance: Verdery reflects on the emotional and psychological impact of discovering her secret police file, which contained extensive surveillance records and accusations of espionage.

Historical Context: The narrative provides a detailed account of life în Romania under Nicolae Ceausescu's regime, highlighting the pervasive nature of state surveillance and its effects on individuals and society.

Duke University Press, 2018, 323 pages

Gangs of Russia: From the Streets to the Corruptors of Power

By Svetlana Stephenson

Historical Context: The book explores the evolution of gangs in Russia, particularly during the 1990s when radical market reforms led to the rise of street gangs that evolved into sophisticated organized crime networks.

Gang Structure: Russian gangs are described as male-dominated, violent alliances that are deeply embedded in society, often overlapping with legitimate structures and mainstream institutions.

Economic Influence: Gangs transitioned from street-level extortion to more complex economic activities, including protection operations for large companies and involvement in the shadow economy.

Social Integration: Despite their criminal activities, gang members often maintain legitimate jobs and social ties, reflecting a unique"double helix" model of social incorporation in Russia.

Cornell University Press, 2015, 277 pages

Banditry in Islam: Case Studies from Morocco, Algeria and the Pakistan North West Frontier

By David M. Hart

Hobsbawm Thesis: Eric Hobsbawm's analysis of banditry as a form of political protest is applied to the Islamic world by David Hart, examining cases from Morocco, Algeria, and Pakistan.

Case Studies: The document includes detailed case studies of banditry in North Western Morocco, the Moroccan Central High Atlas, Colonial Algeria, and the North West Frontier of Pakistan.

Bandit Behavior: The analysis reveals that while elements of political protest were present, bandit behavior was influenced by various other factors, making the Hobsbawm thesis not always applicable.

Historical Context: The document provides historical context and examples of banditry, highlighting the complex interplay between bandits and political power in different regions.

Middle East & North African Studies Press, 1987, 86 pages

Industry of Anonymity: Inside the Business of Cybercrime

By Jonathan Lusthaus

Human Element in Cybercrime: The book emphasizes the human aspect of cybercrime, using the story of Roman Seleznev to illustrate how cyber criminals operate within specific social settings.

Industrialization of Cybercrime: Cybercrime has evolved from individual hackers to a sophisticated, profit-driven industry with specialized roles and professionalization.

Trust and Cooperation: Despite the anonymity and inherent distrust among cybercriminals, they have developed ways to cooperate and build trust, often through online forums and referrals.

Research and Methodology: The book is based on extensive field research over seven years, including 238 interviews, to provide a detailed overview of the cybercrime industry.

Harvard University Press, 2018, 289 pages

"I knew it was a scam": Understanding the triggers for recognizing romance fraud

By: Cassandra Cross

This article investigates the contributing factors (or triggers) to the realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party. Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.

Criminology & Public PolicyVolume 22, Issue 4: Cybercrime and Cybersecurity Nov 2023 Pages 585-894

justiceGuest User
Foreign Youth Exploited for Military Drone Production at the Alabuga Special Economic Zone

By Spencer Faragasso and David Albright

Key Findings

 

  • JSC Alabuga dealt with an acute labor shortage to build Shahed 136 drones by raising salaries and exploiting high school-age students and immigrant employees recruited under false pretenses.

  • JSC Alabuga has been using two programs to actively recruit young men and women, primarily aged 16-22, to make military drones:  Alabuga Polytechnic is used to recruit students within Russia, and the Alabuga Start program is used to recruit workers from the Commonwealth of Independent States (also known as CIS countries) and other countries, primarily African countries.

  • This deceptive and manipulative recruitment effort is intended primarily to enable JSC Alabuga to meet its ambitious Shahed 136 kamikaze drone production goals for the Russian military, a project that Russia steeps in secrecy, to the point of calling it motorboat manufacturing.  

  • Potential recruits are not told that they could be involved in producing Shahed 136 drones. Instead, when drone production work is mentioned, the recruitment process emphasizes the making of M5 drones, built in the same building as the Shahed 136 drones, but by a different company, Albatross LLC, and on a much smaller scale, and advertised for civilian use (but leaked documents and media reporting state that some fraction of the M5 drones have been used in Russian combat operations).

  • Alabuga Polytechnic’s students and Alabuga Start’s recruits have produced thousands of Shahed drones and dozens, perhaps hundreds of Albatross M5 drones for Russian combat operations against Ukraine, often against civilian targets in the case of the Shahed 136 drones.

  • For the Albatross M5 drone, participants are employed and trained in building the airframe, assembling and installing electronics, and testing the drone. For the Shahed 136 drone, they are involved in all aspects of making the drone. According to early internal Alabuga plans, many students and recruits worked on Albatross M5 production before participants were moved to work on producing Shahed 136 drones for JSC Alabuga. 

  • The Alabuga Start program primarily targets African women, using the promise of a high monthly salary (double what can be earned on average in their native country; and more than such a position would normally earn in Russia), work training, long-term accommodations and integration into Russian society. 

  • Twenty-seven countries are documented to have sent nationals to Alabuga through Alabuga Start. It is unknown whether any countries have withdrawn their participation, but they should do so immediately.  If they continue to send workers, these countries directly support a U.S. and EU sanctioned entity and support Russia’s military efforts, thus risk getting sanctioned themselves.

  • Both the Polytechnic and Start programs are exploitive of young people and require the students and recruits to work long hours, often more than full-time.  More than 90 percent of the Start program personnel and about one-third of the Polytechnic students are estimated to work in drone production, mostly the production of Shahed 136 drones.  

  • Based on JSC Alabuga plans in early 2023, the design, planning, support, and production of Shahed drones would entail over 1000 personnel per daytime shift, of whom at least 70 percent would be from Alabuga Polytechnic and Alabuga Start.

  • In the first half of 2023, about 100 Alabuga Polytechnic students received training in Tehran, Iran, from Iranian experts on making the Shahed 136 airframe.

  •  Alabuga is actively indoctrinating the young participants at its site into supporting the Russian military through patriotic and military themed activities.

  • The use of teenagers in the production of military drones used against Ukraine, including against civilian targets, should be viewed as a crime.

Washington, DC: The Institute for Science and International Security, 2024. 22P

Guest User
Male patient attendances at Sexual Assault Treatment Units in Ireland: An analysis of 381 cases and a comparison with female patients

By Daniel Kane, Kieran M. Kennedy, Karen Flood and, Maeve Eogan

Background: Sexual violence is a crime that affects people of all genders. While focus is frequently on female survivors, it is crucial to acknowledge that males also experience sexual violence and to ensure that gender-sensitive services are available to all survivors. Understanding the prevalence of, and factors associated with, sexual violence against males is a critical first step in addressing this issue. We aim to address the lack of data in relation to sexual violence against males. Methods: A cross-sectional study of all male attendances at 6 Sexual Assault Treatment Units (SATU) in the Republic of Ireland over a 6-year period and, where applicable, comparison with corresponding female attendances. Results: There were 381 male attendances with an average age of 28.5 years over the study period, representing 7 % of all SATU patients. There was a 24 % increase in male attendances during the study period. 39.1 % presented within 24 h of the assault. 61.9 % reported the crime to the police. Employment status included 37.3 % employed, 24.9 % unemployed, and 26.2 % students, with 86.7 % being Irish nationals. Most incidents occurred on weekdays (53.3 %) and at night (56.7 %). Referrals were primarily from police (55.9 %), and psychological support was provided in 62.3 % of cases. Alcohol (60.4 %) and illicit drugs (20.5 %) were reported before assaults. 18.6 % suspected drug-facilitated assaults. Male assailants constituted 90.1 %, with 13.9 % involving multiple assailants. Male attenders were significantly more likely than females to be assaulted in their assailant's home and to be assaulted by more than one assailant. They were significantly less likely than females to report the crime to the police or to have consumed alcohol. Conclusion: To our knowledge, this is one of the largest case series of male patients attending a sexual assault treatment service to be published in the international literature. Male patients are a distinct group that are increasingly accessing SATU services. Significant differences exist between male and female patients’ reported experiences of sexual violence. Knowledge of these factors will support appropriate tailoring of treatment & service provision, prevention and awareness strategies to help modify the impact and reduce the incidence of sexual violence in this cohort.

Journal of Forensic and Legal Medicine, 2024. 6p. 

White Collar Crime

By Edwin H. Sutherland

Impact on Criminology: The book has significantly influenced criminological thought, leading to extended discussions and research on white collar crime.

White Collar Crime Definition: Sutherland argues that white collar crime is a violation of criminal law and must be considered in criminological theories

Social Impact: White collar crimes create distrust and social disorganization, affecting social morale more than ordinary crimes.

Research and References: The document includes numerous references to studies and articles that support the book's findings and arguments.

Yale University Press, 1983, 272 pages

Cash, Corruption and Economic Development

By Vikram Vashisht

This book discusses the impact of corruption on economic development and how it hinders progress.It explores what motivates individuals to engage in corrupt activities for financial gain, and argues that paper currency enables corruption due to its untraceable nature.The author advocates a shift to a digital economy to reduce corruption and boost economic growth.

Taylor & Francis, May 18, 2017, 124 pages

Maria Murder and Suicide

By Verrier Elwin

Anthropological Work: Verrier Elwin's research provides a scientific basis for social work and administration among India's tribal populations, focusing on their distinctive ways of life and culture.

Crime Analysis: The book delves into the psychology and circumstances behind violent crimes and suicides among the Mariatribe, aiming to improve the handling of tribal offenders.

Cultural Practices: It highlights the impact of tribal beliefs, such as witchcraft and magic, on crime and social behavior.

Judicial Challenges: The document discusses the difficulties of applying standard legal practices to tribal areas and the need for a nuanced understanding of tribal mentality.

Indian Branch, 1950, 259 pages

National Burden of Injury and Deaths From Shootings by Police in the United States, 2015–2020

By Julie A. Ward, Javier Cepeda, Dylan B. Jackson, Odis Johnson, Daniel W. Webster and Cassandra K. Crifas

Objectives.To describe all-outcome injurious shootings by police and compare characteristics of fatalversus nonfatal injurious shootings nationally.Methods.From July 2021 to April 2023, we manually reviewed publicly available records on all2015–2020 injurious shootings by US police, identified from Gun Violence Archive. We estimated injury frequency, case fatality rates, and relative odds of death by incident and victim characteristics.Results.A total of 1769 people were injured annually in shootings by police, 55% fatally. When a shooting injury occurred, odds of fatality were 46% higher following dispatched responses than police-initiated responses. Injuries associated with physically threatening or threat-making behaviors,behavioral health needs, and well-being checks were most frequently fatal. Relative to White victims,Black victims were overrepresented but had 35% lower odds of fatal injury when shot.Conclusions.This First multi-year, nationwide analysis of injurious shootings by US police suggests that injury disparities are underestimated by fatal shootings alone. Non-policing responses to social needs may prevent future injuries.Public Health Implications.We call for enhanced reporting systems, comprehensive evaluation of emerging reforms, and targeted investment in social services for equitable injury prevention.

American Journal of Public Health, 2024. 11p.

Harassment and Violence Against Health Professionals Who Provide Reproductive Care Proceedings of a Workshop–in Brief

By The National Academies of Sciences, Engineering, and Medicine. 

In December 2023, the National Academies hosted a public webinar in which medical and human rights experts explored concerns related to harassment, threats, and physical attacks against health care professionals working to provide essential reproductive health care. The event was the fourth in a webinar series designed to consider society-wide effects of limits to reproductive health care access in the U.S. following the 2022 Supreme Court Decision in Dobbs v. Jackson Women's Health Organization. This Proceedings of a Workshop-in Brief highlights the presentations and discussions that occurred at the webinar.

Washington, DC: The National Academies Press. 2024. 9p.

The Future of Cybercrime in Light of Technology Developments

By Jacopo BellasioErik SilfverstenEireann LeverettAnna KnackFiona QuimbreEmma Louise BlondesMarina FavaroGiacomo Persi Paoli

The government of Estonia requested support from the European Commission under Regulation (EU) 2017/825 to analyse new and emerging technological developments and identify their potential application in cybercrime. In May 2019, RAND Europe was commissioned by the European Commission Structural Reform Support Service to conduct a study (ref: SRSS/C2018/092) aimed at:Conducting an analysis of future technologies and how these could be used to commit or prevent cybercrimes.Proposing possible ways to prevent future technologies from being exploited for criminal purposes.

To meet the objectives of the study, RAND Europe (i) took stock of current knowledge of and policy on cybercrime as well as of completed and ongoing research on future trends in cybercrime; (ii) conducted horizon scanning activities to identify new and emerging technologies that may have an impact on cybercrime; (iii) engaged with stakeholders and experts to elicit their views on current and future cybercrime and technology trends; and (iv) designed and delivered a table-top exercise to help identify possible policy and legislative measures and initiatives to be adopted in order to prevent new and emerging technologies from being exploited for cybercrime purposes. This document presents an overview of results emerging from activities conducted under the study.

Key Findings

The next decade will likely see an increase in the speed and coverage of connectivity which will contribute to an overall increase in the volume and speed at which different types of cybercrime are conducted.The proliferation of Information Technology-enabled devices, systems, and services will result in an increase in the attack surface and vulnerabilities that could be leveraged by malicious actors.Developments in the fields of computing and data storage technologies, paired with a proliferation of devices, are expected to result in an increased ability to record, generate, store, access and manipulate data.Advances in computing power, accompanied by developments in the fields of artificial intelligence and machine learning, are expected to contribute to a growing ability to process and analyse data, allowing to infer from these new insights and results which are beyond the reach of current analytical capabilities.Technological advances are expected to result in increasing complexity as regards the tracking and attribution of criminal and malicious activities.The consolidation of the internet economy around a limited number of key players, and an increasing societal reliance on their products and services, may raise challenges such as contributing to the widespread emembedding of vulnerabilities with the potential to yield large-scale systemic effects when leveraged.While this study focuses on the impact that technology may have on cybercrime, a wide variety of other non-technical drivers and factors are also expected to influence this phenomenon over the coming decade.

Recommendations

Pursue broad cybercrime capacity building in light of technological development.

Strengthen the overall cybersecurity resilience of Estonia through awareness, education and capacity building.

Seek legal, regulatory and organisational agility.

Prepare the Estonian legal, regulatory and organisational environment to adequately respond to cybercrime challenges resulting from technological change.

Invest in technologies relevant to the Estonian context.

Ensure that Estonia has sufficient technological expertise, skills and research in relation to high-priority emerging technologies.

Santa Monica, CA: RAND, 2020. 13p.

Guest User
Counting the days: Exploring the post-mortem interval factors in sexual homicides

By April Miin Miin Chai, Kylie S. Reale

This study explores the offender, victim, and environmental characteristics that significantly influence the number of days a sexual homicide victim remains undiscovered. Utilizing a sample of 269 cases from the Homicide Investigation Tracking System database an in-depth analysis was conducted to unveil the factors contributing to the delay in the discovery of victims' bodies. The methodological approach involves applying a negative binomial regression analysis, which allows for the examination of count data, specifically addressing the over-dispersion and excess zeros in the dependent variable - the number of days until the victim is found. The findings reveal that certain offender characteristics, victim traits, and spatio-temporal factors play a pivotal role in the time lag experienced in locating the bodies of homicide victims. These findings have crucial implications for investigative efforts in homicide cases, offering valuable insights that can inform and enhance the efficacy and efficiency of future investigative procedures and strategies.

Behavioral Sciences & the Law; May 2024

Guest User
Digital Deviance/Digital Compliance: Criminology, Social Interaction and the Videogame

By Alistair Henry and Shane Horgan

This project sought to begin a process of scoping out and developing criminological perspectives on videogames and the social worlds of videogames and gamers through two interactive workshops. Its starting orientation was social interactionism and the understanding of video games as meaningful and affective places and spaces of interaction, presence, and ‘being’. This orientation sees videogames as potential spaces of cultural expression, symbolic representation, meaning-making, and identification; as interactive spaces of (real and imagined) participation and collaboration; and as ‘social worlds’ which participants inhabit and in which they exercise (some) agency in negotiating their deviance and compliance.

These digital social worlds are part of the fabric of everyday experience for many people who already
drift continuously between presence across different facets of the digital technoscape (including internet, social media and gaming) and the analogue world, potentially finding meaning, connection and identification across them all. This project was thus, from the outset, situated in the study of video games and video gaming within traditions of social interactionism and the sociology of deviance, but it also sought to contribute directly to more recent developments in the field exploring the importance and effects (and affects) of representational forms, symbols, and cultural narratives, such as within visual, cultural and narrative criminologies.

In relation to videogames themselves, the project aimed to be open minded and not restrictive about what could be included. For example, although ‘crime’ features within many video games as a dimension of the narrative, action, or game world, many games do not feature ‘crime’ but feature, or can be played in ways, that signify deviance or compliance. Therefore, the project did not restrict itself to the study of ‘crime games’, or any particular category of games, but remained open to the diverse forms that videogames take (in terms of subject matter, genre, platform etc.).

Glasgow: 

Scottish Centre for Crime and Justice Research, University of Glasgow

2024. 17p.

Guest User
Olympic Violence: Memory, colonialism, and the politics of place

By Simon Springer

This paper proceeds as a brief intervention in response to Andrew Foxall's article "Geopolitics, genocide and the Olympic Games: Sochi 2014". I address the violence that is associated with the Olympic Games and the politics of place that are involved in site selection. In offering some reflections on how the Olympics are irrevocably tied to colonial processes, my primary contention is that it is necessary to ask critical geographical questions about the Games. Such interrogation opens up a dialogue wherein greater awareness for the legacies of violence may be established, which has the potential to interrupt its ongoing unfoldings.

ACME. 2014. 9p.

Successful child sexual violence prevention efforts start with data: how the Violence Against Children and Youth Survey helped curb the tide of child sexual violence in 20 countries

By Laura Chiang, Stephanie Miedema, Janet Saul, James Mercy, Andrew Brooks, Alexander Butchart, Gretchen Bachman, Jennifer Hegle, Daniela Ligiero, Joseph Logan, Greta Massetti

Violence against children is a pervasive global public health and human rights issue, with 1 billion children experiencing at least one form of violence annually. Extensive scientific literature shows childhood adversity, including sexual violence, to be directly and indirectly associated with a host of health and social consequences with a dose–response effect, consequential intergenerational impacts, and sizeable economic ramifications. There is a dearth of population data on the prevalence of childhood sexual violence as well as its antecedents and health and social outcomes, which has hampered violence prevention and child protection efforts globally and locally. Population data are critical, alongside administrative data systems and statistical definitions and classification schemes, for governments to adequately begin addressing violence against children. The absence of national prevalence data has resulted in limited information to guide national policies and prevention strategies, monitor trends, and evaluate prevention efforts. Globally, lack of data on the epidemiological patterns of violence against children has resulted in deficient prioritisation for preventing and responding to this critical problem. Violence Against Children and Youth Surveys (VACS) collect comprehensive data on violence and have been implemented in over 23 countries in Africa, Asia, the Caribbean, Europe and Latin America since 2007. VACS have also been repeated in three countries: Zimbabwe (2011; 2017), Kenya (2010; 2019) and Eswatini (2007; 2022). VACS provide extensive data on the prevalence and contexts of all forms of violence, including sexual violence, therefore allowing for targeted prevention and response efforts. VACS further provide the global research community with data to examine the epidemiological patterns of childhood sexual violence across countries and regions. VACS data have raised awareness and improved understanding of childhood sexual violence in many countries worldwide, and thereby catalysed action. This article draws on VACS reports and empirical publications, to summarise and describe patterns in childhood sexual violence across countries that have completed VACS and shed light on the global prevalence of childhood sexual violence.

BMJ Paediatr Open, 2024. 3p.

Monitoring Online Illegal Wildlife Trade: Setting the Stage: Past, Current and Future Efforts

By The Global Initiative Against Transnational Organized Crime

   The illegal wildlife trade (henceforth IWT) is one of the world’s most lucrative criminal activitiesand much of the trade takes place online. The phenomenon has tremendously harmful effects on biodiversity and animal welfare, while it also exacerbates the risk of spreading zoonic diseases.2 Most online IWT occurs in the open online space – on e-commerce platforms, social media and messenger services such as WhatsApp – where sellers freely showcase wildlife or wildlife products to potential buyers. The ease with which illegal advertisements can be found online reflects the high level of impunity (and the low level of risk) enjoyed by those engaged in the trade.3 The online illegal wildlife trade is characterized by several key trends. First, traffickers exploit a diverse array of online platforms, spanning social media, marketplaces, messaging apps and encrypted channels to market and distribute illegal wildlife products. Second, online IWT is characterized by global reach, transcending geographical boundaries and regulatory jurisdictions, thereby making enforcement of wildlife protection laws a complex undertaking. Finally, the phenomenon has led to the fragmentation of traditional supply chains, with small-scale traders and individual sellers operating alongside larger criminal syndicates. Having a larger number of potential targets makes it difficult for law enforcement to efficiently prioritize and dismantle trafficking networks.5 Defining online illegal wildlife trade Recent publications have shed light on the alarming surge in IWT occurring on the internet.6 A significant hindrance in combating this crime is the dearth of data regarding the scale of the market, its dynamics, modus operandi and resultant consequences, especially on a global scale. To address this issue, ECO-SOLVE is developing a Global Monitoring System to monitor online IWT systematically and to gather global data to feed into law enforcement action and to inform policymaking. By identifying areas of high pressure on endangered species and ecosystems, surveillance activities can enable targeted interventions to prosecute traffickers and wider criminal networks

involved in this trade. Consistent monitoring may help to detect emerging trends and shifts in IWT, allowing for timely responses to new threats and challenges. This is the first in a series of Global Trend Reports, which will be published during the three year ECO-SOLVE project. Two or three of these reports will be published every year, to highlight important trends in online IWT and to contextualize these trends. Drawing on findings generated by the Global Monitoring System – a network of AI enabled ‘data hubs’ in key countries, which monitor online IWT – each Global Trend Report will showcase the latest trends in statistical data, specifically the number of adverts found, the numbers and types of species advertised and the number of platforms that host these adverts. Diving deeper into individual topics, these reports will offer regional breakdowns and include sections that contextualize and analyze findings, while also investigating changes in regulations and their effects on online IWT as well as trends in law enforcement. The reports will also discuss case studies of online IWT. This first report will set the stage for reports to come. It will review past trends in efforts to monitor the online IWT, trends in regulation and other government policies towards IWT, and the evolving role of civil society and law enforcement in responding to the phenomenon.   

Geneva, SWIT: The Global Initiative Against Transnational Organized Crime, 2024. 26p.

Guest User
A Broken Web: Improved Interagency Collaboration is Needed for D.C.’s Crossover Youth,

By  Council for Court Excellence and Office of the D.C. Auditor

While much attention is being paid to youth crime rates in D.C., little is known about the circumstances of justice-involved young people. This report finds that one characteristic many share is involvement in the child welfare system due to parental abuse and neglect. This report examines how effectively the District – and in particular the Child and Family Services Agency (CFSA) and the Department of Youth Rehabilitation Services (DYRS) -- serve young people who have had involvement in both child welfare and youth justice systems, that is, crossover youth

 

The fundamental finding of the audit is that the District lacks a unified approach to addressing the needs of these vulnerable young people. D.C. leaders are unable to accurately identify the number and traits of crossover youth in our community, to coordinate the services being offered or supervision being provided, to target specialized programming for these youth, or provide appropriate resources for their families and caregivers.

The new report includes the following key findings:  

  • There is no single unified source of public data related to crossover youth in the District, making it difficult to understand the number and needs of this vulnerable population. 

  • CFSA and DYRS undercount the number of crossover youth in their care because they only count dual-jacketed youth, rather than youth involved in both agencies at any point in their lives. CFSA and DYRS identified only 8 crossover youth in FY 2023, while CCE analysis of court records indicated 93 youth at the end of FY2022 were involved with the delinquency system and had current or past child welfare involvement. 

  • Crossover youth are essentially invisible to CFSA and DYRS; neither clearly recognizes this population in their current operating documents, systems, policies, or practices, and their rights as justice-involved youth are not clearly identified in the Bill of Rights for Children in Foster Care. This impedes the agencies’ ability to address the special needs and manage cases of these young people, and can leave youth in New Beginnings and other facilities unaware of their rights.

  • CFSA and DYRS do not sufficiently collaborate or communicate regarding crossover youth.   

 

Some of the report’s recommendations include:  

  • D.C. Council should ensure the Office of the Ombudsperson for Children (OFC) has sufficient authority and funding to analyze and report on crossover youth annually. 

  • CFSA and DYRS should reestablish the “Crossover Youth Steering Committee” to identify, manage and serve crossover youth in their care.

  • CFSA and DYRS should identify and track crossover youth in their case management systems.

  • CFSA and DRYS staff should be trained on the unique needs of crossover youth. Additionally, parents and foster parents should receive training and resources to help identify and meet the needs of youth who are, or are at risk of becoming, crossover youth. 

Washington, DC: Council for Court Excellence and Office of the D.C. Auditor, 2024. 125p.

Guest User
Darknet Cybercrime Threats to Southeast Asia

By  United Nations Office on Drugs and Crime (UNODC).

  The United Nations Office on Drugs and Crime (UNODC) is proud to present this introductory analysis of darknet-enabled threats against Southeast Asian countries, which has been made possible through strong partnerships with global and regional law enforcement and justice authorities, together with private industry and academia. The report was produced thanks to kind voluntary funding from the Government of Japan. This report assesses the Darkweb from user, criminal and law enforcement perspectives with a particular focus on cybercriminality targeted at Southeast Asian countries. Darknets (i.e. networks on the Darkweb) provide the ideal environment for a wide range of criminal activities. Just as new threats appear on the Clearnet (i.e. the regular Internet), darknets can facilitate similar attacks that provide perpetrators with a greater degree of anonymity. This anonymity makes investigation and prevention more challenging, but still possible. There has been a consistent increase in darknet and Darkweb usage, both for legitimate and illegitimate reasons, whilst the COVID-19 pandemic also appears to have given rise to darknet cybercrime, including by criminals with no previous cyber experience. Despite this, there is an overall paucity of darknet criminality data specific to Southeast Asia. There is little prioritisation of darknet criminality in the region, either in policy or practice. This creates risk from the criminality itself, which is compounded by the limited political, policy and law enforcement response. There is an absolute need for a ministerial lead on cyber affairs, in each country, to ensure that law enforcers receive necessary political support to undertake the most challenging operations. Many criminal activities conducted over darknets are predictable and preventable. UNODC and its partners work hard to address these challenges by supporting and encouraging policy development, research, training and capacity building support in Southeast Asia. Awareness is fundamental for addressing cybercrime. Given, however, the challenges posed by darknets, stakeholders must increase their commitment and cooperation to developing policy, sharing intelligence and enhancing international cooperation to counter darknet crime nationally, regionally and internationally. This UNODC analysis will inform policymakers in Southeast Asia, including through the annual Senior Officials Meeting on Transnational Crime (SOMTC), as well as supporting law enforcement and judicial cooperation, and providing opportunities for darknet-focused crime prevention. 

  2020. 64p.

Guest User