Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Hacking Generative AI

By Ido Kilovaty

Generative AI platforms, like ChatGPT, hold great promise in enhancing human creativity, productivity, and efficiency. However, generative AI platforms are prone to manipulation. Specifically, they are susceptible to a new type of attack called “prompt injection.” In prompt injection, attackers carefully craft their input prompt to manipulate AI into generating harmful, dangerous, or illegal content as output. Examples of such outputs include instructions on how to build an improvised bomb, how to make meth, how to hotwire a car, and more. Researchers have also been able to make ChatGPT generate malicious code. This article asks a basic question: do prompt injection attacks violate computer crime law, mainly the Computer Fraud and Abuse Act? This article argues that they do. Prompt injection attacks lead AI to disregard its own hard-coded content generation restrictions, which allows the attacker to access portions of the AI that are beyond what the system’s developers authorized. Therefore, this constitutes the criminal offense of accessing a computer in excess of authorization. Although prompt injection attacks could run afoul of the Computer Fraud and Abuse Act, this article offers ways to distinguish serious acts of AI manipulation from less serious ones, so that prosecution would only focus on a limited set of harmful and dangerous prompt injections.

Loyola of Los Angeles Law Review, Vol. 58, 2025, Kilovaty, Ido, Hacking Generative AI (March 1, 2024). Loyola of Los Angeles Law Review, Vol. 58, 2025,

Doing Less with Less: Crime and Punishment in Washington, DC 

 By Charles Fain Lehman

Washington, DC, is making headlines for its crime problems. While other cities saw crime retreat in 2023, the District saw a historic spike in murders, as well as a surge in shocking carjackings, many carried out by teenage offenders. These disturbing crimes are compounded by a general decay in public order in the District, with residents complaining of rampant fare-beating, panhandling, and shoplifting. But why has crime risen in the nation’s capital? The debate around the topic focuses on either the leniency of DC’s laws or the degree to which DC has provided for its most disadvantaged citizens. Nobody can even agree, it seems, on the extent to which crime has risen, or which crimes have gone up or down, with commentators cherry-picking statistics that serve their preferred view of things. This report makes several contributions to the debate over crime in the District of Columbia. The first section presents data on crime in the District, identifying three distinct but related crime problems: a long-standing homicide and group-violence problem; adolescent crime, principally involving auto theft and carjacking; and public disorder, including fare evasion and uncontrolled unsheltered homelessness. The second section connects these trends to a systematic decline of activity in many components of DC’s crime-and-disorder control system, including reductions in police staffing and activity, in prosecution, in pretrial detention, in school attendance, in judicial staffing, and in camp clearance. These two sections, the report then argues, are related. The report calls for viewing DC’s problem through the criminal justice system “capacity” lens—the volume of manpower, attention, space, time, and other resources that the system can dedicate to its crime-fighting function. DC has experienced a comprehensive collapse in its capacity over the past four years; remediating it is the best way to get crime under control. In conclusion, this report lays out several proposals for restoring or expanding capacity, including • Federally funding Metropolitan Police Department (MPD) hiring • Expanding professional development opportunities for MPD officers • “Civilianize” certain MPD roles • Concentrate limited policing resources • Building a dedicated federal–District gang-suppression partnership • Encourage the public to fight crime through public nuisance abatement and the ability of the Advisory Neighborhood Commission (ANC) to deny liquor licenses • Permit the DC attorney general to prosecute cases that the U.S. attorney declines • Give the Senate a time-limited veto over, rather than a confirmation responsibility for, appointments to DC’s courts • Prosecute truants engaged in criminal behavior • Clear camps without apology These steps, this report concludes, should be part of an all-of-government effort to make DC’s criminal-justice system function again—and function better. The report’s Appendix includes model federal legislation for accomplishing these goals through increased funding, expanded prosecutorial authority, and facilitating the nomination and confirmation of DC judges 

New York: The Manhattan Institute, 2024. 39p.

Surveillance Cinema

By Zimmer, Catherine

In Paris, a static video camera keeps watch on a bourgeois home. In Portland, a webcam documents the torture and murder of kidnap victims. And in clandestine intelligence offices around the world, satellite technologies relentlessly pursue the targets of global conspiracies. Such plots represent only a fraction of the surveillance narratives that have become commonplace in recent cinema. Catherine Zimmer examines how technology and ideology have come together in cinematic form to play a functional role in the politics of surveillance. Drawing on the growing field of surveillance studies and the politics of contemporary monitoring practices, she demonstrates that screen narrative has served to organize political, racial, affective, and even material formations around and through surveillance. She considers how popular culture forms are intertwined with the current political landscape in which the imagery of anxiety, suspicion, war, and torture has become part of daily life. From Enemy of the State and The Bourne Series to Saw, Caché, and Zero Dark Thirty, Surveillance Cinema explores in detail the narrative tropes and stylistic practices that characterize contemporary films and television series about surveillance.

New York: NYU Press,  2015. 288p

Changing perceptions of biometric technologies

By Christie Franks and Russell G Smith

Identity crime and misuse cost the Australian economy an estimated $3.1b in 2018–19 (Smith & Franks 2020). Protecting individuals’ personal identification information and finding secure ways to verify identities has become an increased priority as the impact of identity crime continues to grow in Australia and worldwide. Biometric technologies for identity verification provide an enhanced security solution, although implementation of biometric systems within Australian society has met with varying degrees of acceptance. Since 2013, the Australian Institute of Criminology (AIC) has conducted online surveys to gain a greater understanding of identity crime and misuse in Australia. These surveys have asked about respondents’ experience of identity crime and also their previous use of, and future willingness to use, biometric technologies to safeguard their personal information. This report presents both qualitative and quantitative research findings obtained from a sample of respondents in the most recent surveys concerning their experiences of biometrics and perceptions as to its role in identity security.

Research Report no. 20. Canberra: Australian Institute of Criminology. 2021. 76p.

Sexual Violence and Restorative Justice: Addressing the Justice Gap

By Keenan, Marie and Zinsstag, Estelle

This book examines the degree to which restorative justice can contribute to a more enhanced justice response than that currently offered by criminal legal approaches alone, to victims, offenders, and their communities in cases of sexual crime. Concerned by the high attrition rates for sexual crime and the secondary victimization reported in victim accounts, annual reports from court and prosecutor services, and the empirical literature, the book analyses the extent to which restorative justice can address the justice gap that exists in current justice provision. Building on clinical experience and earlier research on sexual crime the researchers engage with the complex dynamics and traumatic impact of sexual violence as a critical starting point for their research and examine whether restorative justice can be appropriate for this crime too. The book presents extensive new data on restorative justice as applied in sexual violence cases across the globe. It engages with feminist concerns regarding the traumatic impact of sexual violence and the potential for re-traumatization; the power imbalances that characterize these offenses and the potential for re-victimization; the potential for coercion of the victim to participate in the process; the potential for manipulation of restorative justice by the offender; and the potential that restorative justice could lead to the reprivatization of sexual crime and ultimately to its decriminalization. Having examined these topics in detail the book concludes there is an important role for restorative justice as a victim-centred service in addressing the justice gap that exists after sexual crime and offers guidance on how this can be achieved.

Oxford, UK: Oxford University Press, 2022. 417p.

The Prevalence of Gambling and Problematic Gambling: a Systematic Review and Meta-Analysis 

 By Lucy T Tran, Heather Wardle, Samantha Colledge-Frisby, Sophia Taylor, Michelle Lynch, Jürgen Rehm, Rachel Volberg, Virve Marionneau, Shekhar Saxena, Christopher Bunn, Michael Farrell, Louisa Degenhardt

Gambling behaviors have become of increased public health interest, but data on prevalence remain scarce. In this study, we aimed to estimate for adults and adolescents the prevalence of any gambling activity, the prevalence of engaging in specific gambling activities, the prevalence of any risk gambling and problematic gambling, and the prevalence of any risk and problematic gambling by gambling activity. Methods We performed a systematic review and meta-analysis. We systematically searched for peer-reviewed literature (on MEDLINE, Embase, and PsycInfo) and grey literature to identify papers published between Jan 1, 2010, and March 4, 2024. We searched for any gambling, including engagement with individual gambling activities, and problematic gambling data among adults and adolescents. We included papers that reported the prevalence or proportion of a gambling outcome of interest. We excluded papers of non-original data or based on a biased sample. Data were extracted into a bespoke Microsoft Access database, with the Joanna Briggs Institute Critical Appraisal Tool used to identify the risk of bias for each sample. Representative population survey estimates were firstly meta-analyzed into country-level prevalence estimates, using metaprop, of any gambling, any risk gambling, problematic gambling, and by gambling activity. Secondly, population-weighted regional-level and global estimates were generated for any gambling, any risk gambling, problematic gambling, and specific gambling activity. This review is registered on PROSPERO (CRD42021251835). Findings We screened 3692 reports, with 380 representative unique samples, in 68 countries and territories. Overall, the included samples consisted of slightly more men or male individuals, with a mean age of 29·72 years, and most samples identified were from high-income countries. Of these samples, 366 were included in the meta-analysis. Globally, 46·2% (95% CI 41·7–50·8) of adults and 17·9% (14·8–21·2) of adolescents had gambled in the past 12 months. Rates of gambling were higher among men (49·1%; 45·5–52·6) than women (37·4%; 32·0–42·5). Among adults, 8·7% (6·6–11·3) were classified as engaging in any risk gambling, and 1·41% (1·06–1·84) were engaging in problematic gambling. Among adults, rates of problematic gambling were greatest among online casino or slots gambling (15·8%; 10·7–21·6). There were few data reported on any risk and problematic gambling among adolescent samples. Interpretation Existing evidence suggests that gambling is prevalent globally, that a substantial proportion of the population engage in problematic gambling, and that rates of problematic gambling are greatest among those gambling on online formats. Given the growth of the online gambling industry and the association between gambling and a range of public health harms, governments need to give greater attention to the strict regulation and monitoring of gambling globally 

The Lancet Public Health, August 2024. Vol 9 August 2024  

Money laundering through video games, a criminals’ playground 

By Dan Cooke, Angus Marshall

Money laundering and video games provide opportunities to criminals for easier and less detectable methods of performing money laundering. These actions may be used as part of a system of transactions, by these criminals, to further disguise the origins of their funds. The use of videogames as a tool to launder money is something that has been only briefly explored. This work identifies the ways that money laundering through video game secondary marketplaces can offer benefits to criminals looking to launder money, versus the use of traditional money laundering methods. We explore the potential for using publicly accessible data, such as that available from the Steam Marketplace, to identify suspicious transactions that may indicate the existence of money laundering within these platforms. This research focused on identifying irregularities in the frequency and quantity of trades on the Steam Marketplace. The results of this investigation show that identifying, using very simple money laundering detection methods, possible cases of money laundering within transactional data from the Steam Marketplace is possible. The data used shows that there were several suspicious transactions and accounts that could warrant further investigation and may be involved in activity that represents money laundering. As a result of this, there is scope for further investigations using larger data sets and examination of other publicly accessible data using a greater range of methods to identify suspicious transactions including, but not limited to, the value of transactions and location. 

Forensic Science International: Digital Investigation, Volume 50, September 2024, 301802

Understanding and Mitigating Cyberfraud in Africa

By Akinbowale, Oluwatoyin E., Mashigo, Mariann P., Zerihun, Prof. Mulatu

The book covers the overview of cyberfraud and the associated global statistics. It demonstrates practicable techniques that financial institutions can employ to make effective decisions geared toward cyberfraud mitigation. Furthermore, the book contains some emerging technologies, such as information and communication technologies (ICT), forensic accounting, big data technologies, tools, and analytics employed in fraud mitigation. In addition, it highlights the implementation of some techniques, such as the fuzzy analytical hierarchy process (FAHP) and system thinking approach to address information and security challenges. The book combines a case study, empirical findings, a systematic literature review, and theoretical and conceptual concepts to provide practicable solutions to mitigate cyber fraud. The major contributions of this book include the demonstration of digital and emerging techniques, such as forensic accounting for cyber fraud mitigation. It also provides in-depth statistics about cyber fraud, its causes, its threat actors, practicable mitigation solutions, and the application of a theoretical framework for fraud profiling and mitigation.

Capetown, AOSIS, 2024 

Hashtag Politics, Power and Propaganda

Edited by Tony Roberts and Karekwaivanane, George Hamandishe

In an era when hashtag campaigns like #MeToo and #BlackLivesMatter capture global attention for victims of injustice, politicians and corporations are now spending billions employing Cambridge Analytica-type consultancies to manufacture disinformation - employing trolls, cyborgs and bots to disrupt dialogue and drown-out dissent. In the first study of its kind, this open-access book presents a range of case studies of these emerging dynamics across Africa, mapping and analyzing disinformation operations in ten different countries, and using innovative techniques to determine who is producing and coordinating these increasingly sophisticated disinformation machines. Drawing on scholars from across the continent, case studies document the actors and mechanisms used to profile citizens, manipulate beliefs and behaviour, and close the political space for democratic dialogue and policy debate. Chapters include examinations of how the Nigerian government deployed disinformation when the #EndSARS campaign focused attention on police brutality and corruption; insights into how pro-government actors responded to the viral #ZimbabweanLivesMatter campaign; and how misogynists mobilized against the #AmINext campaign against gender-based violence in South Africa. Through the documentation of episodes of unruly politics in digital spaces, these studies provide a valuable assessment of the implications of these dynamics for digital rights, moving beyond a focus on elaborations of the idea of ‘fake news’, and providing actionable recommendations in the areas of policy, legislation and practice. The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com.

London: Zed Books, 2024. 256p.

Fatal Family Violence and the Dementias: Gray Mist Killings

By Neil Websdale

This book explores dementia-related aggression, violence, and homicide through a detailed analysis of “gray mist killings.” The term gray mist killing refers to intimate partner homicides (IPHs) committed by spouses/partners suffering from dementia, homicides of dementia sufferers committed by their caregiving spouses/partners or other family members, and IPHs attributable to the complications of caring for a co-resident family member suffering from dementia. Killings by people with dementia raise questions about the role of biological, psychological, and sociological forces. This book therefore encourages discussions around the relative weighting of these interrelated forces, and why the criminal justice system and the courts have a hard time handling these killings. It also adds to our understanding of the social responses to people with dementia, the orchestration of services, the nature of caring, and the interaction between sufferers and those familial, community, and state actors who provide support and care. The vividly detailed case studies (from the US, UK, and Australia) uniquely inform criminological debates about violence, homicide, and the social responses to these complex phenomena. They are organized around the apparent motives for the killing, such as mercy, theft, prior intimate partner violence, mental illness, and exhaustion. The social responses of families, communities, and state actors are examined and contextualized against what researchers and dementia specialists suggest are promising or best practices for intervention. Apparent triggers or circumstantial precipitants for the killings invite discussion of signals, risks, and preventive interventions. The book culminates in an attempt to make sense of gray mist killings, as well as a discussion of broader implications and significance in relation to globalization, violence against women, the rising prevalence of the dementias, declining birthrates, climate change, and sustainable economic development. Drawing from a variety of disciplines, this book will be of great interest to students and scholars of criminology, sociology, psychology, psychiatry, anthropology, gender studies, social work, law, public policy, and gerontology. It should also appeal to judges, prosecutors, lawyers, social workers, gerontologists, law enforcement, adult protective services, physicians, psychologists, and psychiatrists.

Abingdon, Oxon ; New York, Routledge, 2024. 252p.

Violent Offending, Desistance, And Recidivism Violent Offending, Desistance, And Recidivism 

By Daniel O'Connell,  Christy Visher,  Lin Liu

This Article reviews what is known from the field of criminology about the nature of crime patterns in general, focusing particularly on violence, violent people, and how violence manifests in the lives of individuals who commit crime. Broad consensus exists in the research community that offending careers of individuals who commit crimes vary substantially from person to person. Most people tend to commit non-violent crimes and while many violent offenders recidivate after being released from prison, the majority do not. Moreover, the type of violent crime committed—expressive versus instrumental—may be an important distinction. We draw several conclusions from the research on violence and violent recidivism and what it can mean for policymakers and their decision-making. Armed with accurate information about violent offending, policymakers, and practitioners may be able to propose appropriate policy changes and make more informed decisions about the likelihood of violent offending and recidivism among persons who commit crimes.  

103 Marq. L. Rev. 983 (2020). 

Dating hot spot to fraud hot spot: Targeting the social characteristics of fraud victims in England and Wales

By Richard SinclairMatthew BlandBradley Savage

We found that romance fraud was rising year-on-year across every region in England and Wales, increasing 55% during the 3 years between October 2018 and October 2021. Fifty percent of all the romance fraud victims in the period resided in 17% of the places where romance fraud had occurred. A total of 439 locations (outward postcode areas) were identified as the “power few” in the first year of the data set. Of these 439 locations, 162 of them recurred in both of the following years, becoming chronic “hot spot” locations containing more than one in six of all reported romance fraud victims. The demography of victims in repeat locations differed considerably, but hot spots were more frequently predominantly populated by less affluent populations. We conclude that the current national one-size-fits-all fraud prevention approach may not be the most efficient or effective way to reach those victims who most require crime prevention advice. The National Fraud Intelligence Bureau, based in the City of London Police, could adopt a tailored approach to providing preventative information to local police forces based on the year-to-year patterns in crime and the associated intelligence provided by sociodemographic data sources such as Acorn.

Criminology & Public Policy Volume 22, Issue 4: Cybercrime and Cybersecurity Nov 2023 Pages 585-894

rule of lawSara Donlan
My Life as a Spy: Investigations in a Secret Police File

By Katherine Verdery

Surveillance and Identity: The author, Katherine Verdery, explores how being under surveillance by Romania's secret police during the Cold War affected her sense of identity and her work as an anthropologist.

Ethnography and Spying: The book delves into the similarities and differences between ethnographic research and spying, questioning the ethical implications of both practices.

Impact of Surveillance: Verdery reflects on the emotional and psychological impact of discovering her secret police file, which contained extensive surveillance records and accusations of espionage.

Historical Context: The narrative provides a detailed account of life în Romania under Nicolae Ceausescu's regime, highlighting the pervasive nature of state surveillance and its effects on individuals and society.

Duke University Press, 2018, 323 pages

Gangs of Russia: From the Streets to the Corruptors of Power

By Svetlana Stephenson

Historical Context: The book explores the evolution of gangs in Russia, particularly during the 1990s when radical market reforms led to the rise of street gangs that evolved into sophisticated organized crime networks.

Gang Structure: Russian gangs are described as male-dominated, violent alliances that are deeply embedded in society, often overlapping with legitimate structures and mainstream institutions.

Economic Influence: Gangs transitioned from street-level extortion to more complex economic activities, including protection operations for large companies and involvement in the shadow economy.

Social Integration: Despite their criminal activities, gang members often maintain legitimate jobs and social ties, reflecting a unique"double helix" model of social incorporation in Russia.

Cornell University Press, 2015, 277 pages

Banditry in Islam: Case Studies from Morocco, Algeria and the Pakistan North West Frontier

By David M. Hart

Hobsbawm Thesis: Eric Hobsbawm's analysis of banditry as a form of political protest is applied to the Islamic world by David Hart, examining cases from Morocco, Algeria, and Pakistan.

Case Studies: The document includes detailed case studies of banditry in North Western Morocco, the Moroccan Central High Atlas, Colonial Algeria, and the North West Frontier of Pakistan.

Bandit Behavior: The analysis reveals that while elements of political protest were present, bandit behavior was influenced by various other factors, making the Hobsbawm thesis not always applicable.

Historical Context: The document provides historical context and examples of banditry, highlighting the complex interplay between bandits and political power in different regions.

Middle East & North African Studies Press, 1987, 86 pages

Industry of Anonymity: Inside the Business of Cybercrime

By Jonathan Lusthaus

Human Element in Cybercrime: The book emphasizes the human aspect of cybercrime, using the story of Roman Seleznev to illustrate how cyber criminals operate within specific social settings.

Industrialization of Cybercrime: Cybercrime has evolved from individual hackers to a sophisticated, profit-driven industry with specialized roles and professionalization.

Trust and Cooperation: Despite the anonymity and inherent distrust among cybercriminals, they have developed ways to cooperate and build trust, often through online forums and referrals.

Research and Methodology: The book is based on extensive field research over seven years, including 238 interviews, to provide a detailed overview of the cybercrime industry.

Harvard University Press, 2018, 289 pages

"I knew it was a scam": Understanding the triggers for recognizing romance fraud

By: Cassandra Cross

This article investigates the contributing factors (or triggers) to the realization of romance fraud victimization, based on 1015 reports lodged with Scamwatch (Australian online reporting portal for fraud) between July 2018 and July 2019 (inclusive). The article examines the free text narrative of each report to propose five discernible trigger categories: further requests for money; characteristics of communications; verification checks; an offender's action(s); and being told by a third party. Based on a comprehensive understanding of these five categories, the article advocates for broader messaging approaches to encompass financial literacy and well-being, cyberliteracy and critical thinking skills, cybersecurity practices, and respectful and healthy relationships. Leveraging the use of these wider education and awareness campaigns could improve recognition of romance fraud. Importantly, it is suggested that banks and other financial institutions are in a strong position to focus their efforts on some of these broader messages to effect positive change.

Criminology & Public PolicyVolume 22, Issue 4: Cybercrime and Cybersecurity Nov 2023 Pages 585-894

justiceSara Donlan
Foreign Youth Exploited for Military Drone Production at the Alabuga Special Economic Zone

By Spencer Faragasso and David Albright

Key Findings

 

  • JSC Alabuga dealt with an acute labor shortage to build Shahed 136 drones by raising salaries and exploiting high school-age students and immigrant employees recruited under false pretenses.

  • JSC Alabuga has been using two programs to actively recruit young men and women, primarily aged 16-22, to make military drones:  Alabuga Polytechnic is used to recruit students within Russia, and the Alabuga Start program is used to recruit workers from the Commonwealth of Independent States (also known as CIS countries) and other countries, primarily African countries.

  • This deceptive and manipulative recruitment effort is intended primarily to enable JSC Alabuga to meet its ambitious Shahed 136 kamikaze drone production goals for the Russian military, a project that Russia steeps in secrecy, to the point of calling it motorboat manufacturing.  

  • Potential recruits are not told that they could be involved in producing Shahed 136 drones. Instead, when drone production work is mentioned, the recruitment process emphasizes the making of M5 drones, built in the same building as the Shahed 136 drones, but by a different company, Albatross LLC, and on a much smaller scale, and advertised for civilian use (but leaked documents and media reporting state that some fraction of the M5 drones have been used in Russian combat operations).

  • Alabuga Polytechnic’s students and Alabuga Start’s recruits have produced thousands of Shahed drones and dozens, perhaps hundreds of Albatross M5 drones for Russian combat operations against Ukraine, often against civilian targets in the case of the Shahed 136 drones.

  • For the Albatross M5 drone, participants are employed and trained in building the airframe, assembling and installing electronics, and testing the drone. For the Shahed 136 drone, they are involved in all aspects of making the drone. According to early internal Alabuga plans, many students and recruits worked on Albatross M5 production before participants were moved to work on producing Shahed 136 drones for JSC Alabuga. 

  • The Alabuga Start program primarily targets African women, using the promise of a high monthly salary (double what can be earned on average in their native country; and more than such a position would normally earn in Russia), work training, long-term accommodations and integration into Russian society. 

  • Twenty-seven countries are documented to have sent nationals to Alabuga through Alabuga Start. It is unknown whether any countries have withdrawn their participation, but they should do so immediately.  If they continue to send workers, these countries directly support a U.S. and EU sanctioned entity and support Russia’s military efforts, thus risk getting sanctioned themselves.

  • Both the Polytechnic and Start programs are exploitive of young people and require the students and recruits to work long hours, often more than full-time.  More than 90 percent of the Start program personnel and about one-third of the Polytechnic students are estimated to work in drone production, mostly the production of Shahed 136 drones.  

  • Based on JSC Alabuga plans in early 2023, the design, planning, support, and production of Shahed drones would entail over 1000 personnel per daytime shift, of whom at least 70 percent would be from Alabuga Polytechnic and Alabuga Start.

  • In the first half of 2023, about 100 Alabuga Polytechnic students received training in Tehran, Iran, from Iranian experts on making the Shahed 136 airframe.

  •  Alabuga is actively indoctrinating the young participants at its site into supporting the Russian military through patriotic and military themed activities.

  • The use of teenagers in the production of military drones used against Ukraine, including against civilian targets, should be viewed as a crime.

Washington, DC: The Institute for Science and International Security, 2024. 22P

Guest User
Male patient attendances at Sexual Assault Treatment Units in Ireland: An analysis of 381 cases and a comparison with female patients

By Daniel Kane, Kieran M. Kennedy, Karen Flood and, Maeve Eogan

Background: Sexual violence is a crime that affects people of all genders. While focus is frequently on female survivors, it is crucial to acknowledge that males also experience sexual violence and to ensure that gender-sensitive services are available to all survivors. Understanding the prevalence of, and factors associated with, sexual violence against males is a critical first step in addressing this issue. We aim to address the lack of data in relation to sexual violence against males. Methods: A cross-sectional study of all male attendances at 6 Sexual Assault Treatment Units (SATU) in the Republic of Ireland over a 6-year period and, where applicable, comparison with corresponding female attendances. Results: There were 381 male attendances with an average age of 28.5 years over the study period, representing 7 % of all SATU patients. There was a 24 % increase in male attendances during the study period. 39.1 % presented within 24 h of the assault. 61.9 % reported the crime to the police. Employment status included 37.3 % employed, 24.9 % unemployed, and 26.2 % students, with 86.7 % being Irish nationals. Most incidents occurred on weekdays (53.3 %) and at night (56.7 %). Referrals were primarily from police (55.9 %), and psychological support was provided in 62.3 % of cases. Alcohol (60.4 %) and illicit drugs (20.5 %) were reported before assaults. 18.6 % suspected drug-facilitated assaults. Male assailants constituted 90.1 %, with 13.9 % involving multiple assailants. Male attenders were significantly more likely than females to be assaulted in their assailant's home and to be assaulted by more than one assailant. They were significantly less likely than females to report the crime to the police or to have consumed alcohol. Conclusion: To our knowledge, this is one of the largest case series of male patients attending a sexual assault treatment service to be published in the international literature. Male patients are a distinct group that are increasingly accessing SATU services. Significant differences exist between male and female patients’ reported experiences of sexual violence. Knowledge of these factors will support appropriate tailoring of treatment & service provision, prevention and awareness strategies to help modify the impact and reduce the incidence of sexual violence in this cohort.

Journal of Forensic and Legal Medicine, 2024. 6p.