Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

State Permissive Behaviours and Commercial Offensive-Cyber Proliferation

By Gareth Mott, James Shires, Jen Ellis, James Sullivan and Jamie MacColl

Commercial cyber tools and services have many legitimate applications, from corporate penetration testing (an authorised simulated cyber attack on an IT system) to law enforcement and national security operations. But they are also subject to misuse and abuse, when they are used in ways that are contrary to national or international law, violate the human rights of their targets, or pose risks to international security. Some states are currently grappling with this policy challenge. Meanwhile, collective international initiatives for action are underway. For example, there is the US’s 2023 Joint Statement on Efforts to Counter the Proliferation and Misuse of Commercial Spyware and the UK- and France-led Pall Mall Process of 2024. Ultimately, one aim of these initiatives is to enable states to harmonise their policy interventions where possible. To inform principles and policies for intervention at national and international levels, it is necessary to understand the dynamics that encourage or facilitate offensive-cyber proliferation. This paper identifies a range of ‘non-state proliferating factors’ (NPFs) and ‘state permissive behaviours’ (SPBs), and its findings draw on desk-based research on the international commercial offensive-cyber market. These findings were supplemented by a data validation and consultative workshop with industry stakeholders held in person at Chatham House in March 2024. This half-day validation workshop drew on the expertise and insights of 44 participants predominantly based in the UK, the US and Western Europe. To facilitate candid discussion, remarks made at the workshop are not attributable, and the identities of participants are not referenced here.

In this paper, NPFs and SPBs are categorised into five areas:

  1. Regulation of corporate structure and governance.

  2. Legal frameworks for product development, sale and transfer.

  3. Diplomatic support and engagement.

  4. Development of cyber-security ecosystem and workforce.

  5. Integration with defence and security industrial base.

Using these categories, this research analyses the roles of both state and non-state actors. It identifies critical inter-relationships between different SPBs and NPFs that serve to facilitate or enable potentially irresponsible offensive-cyber proliferation. This is one of two papers. A second paper, authored by the researchers and published by Chatham House in October 2024, draws on the findings in this paper and identifies a range of ‘principles’ that could be used to build a code of conduct to counter irresponsible offensive-cyber proliferation.

London: Royal United Services Institute for Defence and Security Studies - RUSI and The Royal Institute of International Affairs, 2024. 39p.

Violence Against Children in The European Union: Current Situation: In-Depth Analysis 18-10-2024

By Martina Prpic with Melissa Eichhorn

Violence against children takes various forms and occurs in different contexts. It can have serious, harmful consequences in both the short and long term, and estimates of the scale of the problem are alarming. Resulting from a complex interaction of various risk factors, this violence can nevertheless be avoided through effective prevention policies. Several international instruments have been adopted to safeguard and promote children's rights. The cornerstone in this framework of instruments is the United Nations Convention on the Rights of the Child, Article 19 of which lays down the right of a child to be protected from all forms of violence and the obligation on states to take all appropriate measures to protect children. With the entry into force of the Lisbon Treaty, the protection of children's rights has been explicitly recognized as an objective that the EU has an obligation to pursue. While child protection systems fall mainly within the responsibility of the EU Member States, the EU itself plays an important role too. Its actions have a direct impact on laws and policies implemented at the national level. Enhanced cooperation between all stakeholders and the exchange of best practices are the routes taken to address the issue.

EPRS | European Parliamentary Research Service 2024. 31p.

 Becoming a Violent Broker: Cartels, Autodefensas, and The State in Michoacán, Mexico 

By Romain Le Cour Grandmaison

This article explores the construction – or reconstruction – of brokerage channels by violent actors in Mexico. It focuses on the construction of the Autodefensas de Michoacán (SelfDefense Groups of Michoacán) and studies the process that put illegal armed leaders in active dialogue with the Mexican federal government, but also how they became brokers capable of controlling access to strategic political resources, economic markets, and the connections that tie local citizens and the central state. Through the concept of political intermediation, I investigate how coercion, as a skill and resource, has become central to governance in Mexico; and how this leads to consolidating intermediaries that participate in reproducing local, violent political order. This article shall contribute to the understanding of brokerage in contexts of violence, and shed new light on the political logic fueling the dynamics of violence in Mexico’s war on drugs. Keywords: drug cartels, brokerage, Mexico, war on drugs, state, violence

European Review of Latin American and Caribbean Studies Revista Europea de Estudios Latinoamericanos y del Caribe 2021.

National Review of Child Sexual Abuse and Sexual Assault Legislation in Australia

By Christopher Dowling,  Siobhan Lawler,  Laura Doherty,  Heather Wolbers 

This is the Australian Institute of Criminology’s (AIC) national review of child sexual abuse and sexual assault legislation. The Australian Attorney-General’s Department (the Department) commissioned this review to support implementation of the Standing Council of Attorneys-General (SCAG) Work Plan to Strengthen Criminal Justice Responses to Sexual Assault 2022–2027 (the Work Plan), under which all jurisdictions agreed to take collective and individual action. Specifically, this review supports SCAG Work Plan Priority 1 (‘Strengthening legal frameworks to ensure victims and survivors have improved justice outcomes and protections’) and aligns with the following corresponding action: 1.1 Criminal laws: Review the criminal offences and legal definitions (including consent) relating to sexual offending in the context of the unique characteristics of each jurisdiction’s legislative framework and criminal justice system and, if necessary, consider progressing and implementing appropriate reforms. The national review also responds to concerns expressed by advocate Grace Tame during a presentation at the November 2021 Meeting of Attorneys-General around the inconsistencies in child sexual abuse and sexual assault laws across Australia. Importantly, this review is being undertaken in the wake of the Royal Commission into Institutional Responses to Child Sexual Abuse, which recommended a series of reforms to the criminal justice system (2017: 194). Although Commonwealth offences were strengthened in response to the Commission’s recommendations, Australian states and territories are at different stages of implementing the recommended reforms. The review broadly addresses these research questions: 1. What is the nature and scope of sexual assault and child sexual abuse legislation in Australia? 2. What differences and similarities (if any) are there between sexual assault and child sexual abuse legislative frameworks in Australia? 3. What impact (if any) do legislative inconsistencies have on: a. the investigation and prosecution of sexual assault and child sexual abuse matters in the criminal justice system; and b. the ability of victims and survivors to receive the support they require? 4. What are the barriers/challenges to achieving consistency in child sexual abuse and sexual assault legislation in Australia? 5. What are the gaps in current legislation for responding to new and emerging trends in sexual violence? 6. What does ‘best practice’ in relation to sexual assault and child sexual abuse legislation look like?   

Canberra:  Australian Institute of Criminology 2024 . 375p.

Gang‐Related Crime in Los Angeles Remained Stable Following COVID‐19 Social Distancing Orders

By Paul Jeffrey Brantingham, George E. Tita,  and George Mohler 

The onset of extreme social distancing measures is expected to have a dramatic impact on crime. Here, we examine the impact of mandated, city-wide social distancing orders aimed at limiting the spread of COVID-19 on gang-related crime in Los Angeles. We hypothesize that the unique subcultural processes surrounding gangs may supersede calls to shelter in place and allow gang-related crime to persist. If the normal guardianship of people and property is also disrupted by social distancing, then we expect gang violence to increase. Using autoregressive time series models, we show that gang-related crime remained stable and crime hot spots largely stationary following the onset of shelter-in-place. Policy Implications: In responding to disruptions to social and economic life on the scale of the present pandemic, both police and civilian organizations need to anticipate continued demand, all while managing potential reductions to the workforce. Police are faced with this challenge across a wide array of crime types. Civilian interventionists tasked with responding to gang-related crime need to be prepared for continued peacekeeping and violence interruption activities, but also an expansion of responsibilities to deal with “frontline” or “street level” management of public health needs. 

Criminology & Public Policy. 2021;20:423–436. 

Mainstream Media Use In Far-Right Online Ecosystems

By Mario Peucker, Thomas J Fisher, Jacob Davey

The media does not enjoy a high level of trust among Australians, as many people question the commitment of mainstream media to objective and nonpartisan reporting. While this mistrust is widespread, it manifests in particularly antagonistic ways within far-right milieus, where mainstream media is often seen through a conspiratorial lens as the ‘enemy of the people’ who actively conspire against the wellbeing of ‘ordinary’ or ‘white’ people. This almost unanimously hostile perception, however, does not stop people within far-right online spaces from posting mainstream media outputs to convey ideological messages in their online communities. Context This research report presents key findings from an analysis of far-right online communities on Facebook and the alt-tech fringe platform Gab, which has been described as a ‘right-leaning echo chamber’ (Lima et al. 2018:1). The study was conducted by researchers at the Institute for Sustainable Industries & Liveable Cities at Victoria University (VU), in collaboration with the Institute for Strategic Dialogue (ISD), within the research stream ‘Dynamics of Violent Extremism’ at the Centre for Resilient and Inclusive Societies (CRIS). What we did The research combines quantitative and qualitative methods. We analyzed around 11,000 Facebook posts and 45,000 Gab posts by Australian-based accounts and users who meet our working definition of far-right (see section 2). This quantitative analysis offers insights into the prevalence of mainstream media sources in their far-right online messaging and which outlets are particularly frequently shared. In addition, we conducted a qualitative multimodal in-depth analysis of a quasi-random sample of 224 Facebook and 298 Gab posts that contained an outbound link to a URL domain associated with a mainstream media outlet. This qualitative analysis allowed us to identify how mainstream media are (re)framed and (mis)appropriated within these far-right online space to deliver certain ideological messages.    

Melbourne; The Centre for Resilient and Inclusive Societies. August 2022. 26p.

Online and Offline Racism in Victoria. The Context of Online Racism in Victoria in 2020

By Craig McGarty

An analysis of Twitter content from Victoria in 2020 found low levels of racial vilification of Asians. This surprising low level of public online racism is consistent with reanalysis of survey data. Racism directed against Asian Australians and others is an ongoing source of harm. There is not, however, good reasons to believe that hatred of Asians was successfully mobilized and exacerbated in Victoria in 2020 by mass online means. Racism needs to be confronted wherever it occurs, but the uncritical acceptance of media narratives is unlikely to help the cause of confronting it.     

Melbourne: Centre for Resilient and Inclusive Societies, 2023; 36p. 

Crime, Place, and Networks in the Age of the Internet: The Case of Online-Promoted Illicit Massage Businesses

By Leke de Vries

The association between crime and place is one of the most empirically supported notions in criminology. However, less is known about whether the internet has impacted the environmental conditions that contribute to crime in physical space. To address this gap, this dissertation examines the intersection of crime, place, and networks in the context of online promoted illicit massage businesses (IMBs). IMBs are establishments that host a wide variety of crimes and deviancies, and have recently gained attention due to their connection to human trafficking operations. While commercial sex and sex trafficking in IMBs are promoted through online classifieds and review boards, the illicit behaviors still require an offline act or transaction in stationary locations such as storefronts. Therefore, IMBs offer a compelling case to understand whether a criminology of place perspective applies to online-promoted crimes. Using innovative data and robust, quantitative and computational methods, this study shows that the geography and use of IMBs are driven by environmental conditions that are central to criminological theory about crime and place. However, the findings also suggest subtle changes to the geography of online-promoted crimes. In particular, IMBs and clientele demand were identified in neighborhoods that on the one hand feature aspects of social disorganization and crime opportunity theories, and on the other hand were theoretically unanticipated (e.g. in advantaged areas). Moreover, many clientele traversed neighborhood boundaries to frequent IMBs, connecting both spatially proximate and distant neighborhoods in patterns of crime. Lastly, the findings show the limitations of current policing models that are challenged by the locational flexibility of IMBs. Overall, these findings raise questions about a criminology of place in the digital age, call for theoretical integration, and a response model that engages online and offline domains and involves partnerships within and outside of the criminal justice system. 

 Boston: College of Social Sciences and Humanities of Northeastern University  202o. 124p

The Irish Channel: Investigating an Irish Misinformation Hub, Political Connections and AI Hallucinations

By Ciarán O’Connor

This report investigates the activities of the Irish Channel, a website, and associated social media accounts that have emerged as a highly active hub of misinformation in Ireland. The website gained notoriety in June 2024 following its publication of an article containing fabricated quotes and false claims alleging election interference during the local elections.1 This ‘election interference’ narrative reflected other baseless conspiracies alleging voter fraud was a threat to election integrity in the country. The Irish Channel website is part of the Premier Content Network which is run by the Digital Publishing Company. Its primary form of content across its range of websites is embedded YouTube videos, likely with the aim of driving traffic to its site and boosting ad revenue. Yet, as this analysis details, this may violate YouTube’s terms of service. This report profiles how original content produced by the Irish Channel contains inaccuracies and falsehoods, as well as content that is supportive of far-right ideologies including hateful anti-immigrant rhetoric. Analysis by ISD also indicates some of this content appears to have been generated using AI, with basic factual errors and non-existent citations being found on more than one article on the Irish Channel website. Accounts on social media and messaging platforms linked to the Irish Channel were found to feature white supremacist conspiracy theories, antisemitic hate, and support for Adolf Hitler. Additionally, the report highlights how the Irish Channel has forged close ties with the Irish Freedom Party and has, over time, become a key media distribution and broadcasting arm for the party. Many of the most egregious instances of false, misleading, and inflammatory claims found in this analysis originated from content published in conjunction with Irish Freedom Party-linked entities and hosted and promoted by the Irish Channel. This Irish Channel case study illustrates how small, far-right political parties can use digital media platforms and social media accounts to develop alternative media networks, promote their ideology, and grow their.

London :  Institute for Strategic Dialogue 2024. 18p.

TikTok and Anti-Migrant & Anti-Refugee Content

By Lucy Cooper and Kevin D. Reyes

Once considered a mere novelty app, TikTok is now a certified force in the information ecosystem.  

The short form video giant is now being used by 14% of Americans as a news platform, according to a Pew Research Centre from 2023, an amount four times more than in 2020.  The impact of the platform, once best known for dance crazes and being a tastemaker for online trends, cannot be ignored. To better understand the impact that TikTok has, in 2023 ISD analysts gathered and analyzed data on trends in hate speech and extremist content on TikTok, and how effectively they were being moderated by the platform. The results, which center on a particular moment in time, have come to inform a series of studies – the first two of which focus on white supremacist content, and anti-migrant and -refugee content. While TikTok appears to have taken measures to improve content moderation practices since ISD’s 2021 study on extremism and hate speech on the platform, this new series demonstrates that TikTok is still ineffective in removing violative content. For example, data for the white supremacy content study was collected during one week in mid-August 2023 and indicates that such content was alive and well on the platform: 70 of the 108 video samples studied were uploaded to TikTok within the most recent three months at the time of collection. Of those 108 videos, the median number of views at the time of analysis was 6,097, a significant increase from ISD’s 2021 report where the median across 1,030 videos was 503 views. The last nine months have been tumultuous for TikTok as a company. In April 2024, President Joe Biden signed a bill that could result in a nationwide ban of the app should TikTok’s parent company, the Beijing-based ByteDance, not sell the platform within 12 months. As part of an ongoing legal fight over the possible ban, the Justice Department, according to the Associated Press, this summer alleged that TikTok was gathering bulk information on users’ “views on divisive social issues like gun control, abortion, and religion,” and harvesting data in violation of children’s online privacy law. As TikTok’s future remains undecided, content moderation issues on the platform persist. In July 2024, ISD published a report detailing the millions of views garnered by a network of neo-Nazi accounts on the platform. Just a month earlier, however, TikTok had published an updated transparency report in which they claimed that in the first four months of this year, moderators proactively removed 97.7% of violative content. Of that same sample, 89.8% were removed within 24 hours, down .1% from that same period in 2023. Despite TikTok’s statements, ISD and similar organizations consistently find content in clear violation of the platform’s policies

London: Institute for Strategic Dialogue 2024. 

TikTok and White Supremacist Content

By Ciarán O’Connor and Jared Holt

Once considered a mere novelty app, TikTok is now a certified force in the information ecosystem.  

The short-form video giant is now being used by 14% of Americans as a news platform, according to a Pew Research Centre from 2023, an amount four times more than in 2020.  The impact of the platform, once best known for dance crazes and being a tastemaker for online trends, cannot be ignored. To better understand the impact that TikTok has, in 2023 ISD analysts gathered and analyzed data on trends in hate speech and extremist content on TikTok, and how effectively they were being moderated by the platform. The results, which center on a particular moment in time, have come to inform a series of studies – the first two of which focus on white supremacist content, and anti-migrant and -refugee content. While TikTok appears to have taken measures to improve content moderation practices since ISD’s 2021 study on extremism and hate speech on the platform, this new series demonstrates that TikTok is still ineffective in removing violative content. For example, data for the white supremacy content study was collected during one week in mid-August 2023 and indicates that such content was alive and well on the platform: 70 of the 108 video samples studied were uploaded to TikTok within the most recent three months at the time of collection. Of those 108 videos, the median number of views at the time of analysis was 6,097, a significant increase from ISD’s 2021 report where the median across 1,030 videos was 503 views. The last nine months have been tumultuous for TikTok as a company. In April 2024, President Joe Biden signed a bill that could result in a nationwide ban of the app should TikTok’s parent company, the Beijing-based ByteDance, not sell the platform within 12 months. As part of an ongoing legal fight over the possible ban, the Justice Department, according to the Associated Press, this summer alleged that TikTok was gathering bulk information on users’ “views on divisive social issues like gun control, abortion, and religion,” and harvesting data in violation of children’s online privacy law. As TikTok’s future remains undecided, content moderation issues on the platform persist. In July 2024, ISD published a report detailing the millions of views garnered by a network of neo-Nazi accounts on the platform. Just a month earlier, however, TikTok had published an updated transparency report in which they claimed that in the first four months of this year, moderators proactively removed 97.7% of violative content. Of that same sample, 89.8% were removed within 24 hours, down .1% from that same period in 2023. Despite TikTok’s statements, ISD and similar organizations consistently find content in clear violation of the platform’s policies.  

London Institute for Strategic Dialogue (2024). . 15p.

From Camps to Computers: Inside the Black Hebrew Israelite Extremist Ecosystem on Facebook

By Luke Baumgartner

Tracing its origins back to the 19th century, the Black Hebrew Israelite (BHI) movement is ideologically and organizationally highly fragmented. At its core, it believes that modern African Americans are descendants of the Israelites in the Bible’s Old Testament, but some currents adopt variations of BHI ideology. While most adherents to the movement are peaceful, over the last few years, several individuals associated with BHI ideology participated in high-profile violent crimes targeting Jews in the United States, including the targeting of the JC Kosher Supermarket in Jersey City, New Jersey,[1] and a Hanukkah celebration in Monsey, New York, in December 2019.[2] While the attackers had little to no formal or institutional participation in the movement, their extremist interpretation of BHI’s core beliefs contributed to their radicalization, mobilization of violence, and, ultimately, their target selection. Moreover, violent attacks by adherents of the BHI ideology stretch back as far as 1974, when Marcus Wayne Chenault, a student of Hananiah E. Israel, shot Alberta Williams King–the mother of slain civil rights activist Martin Luther King Jr.[3] In 2022, the Program on Extremism released a report–one of the first of its kind–analyzing BHI’s ideology and relations to violence.[4] Despite its ample use of social media and track record of violence, little is known about how the broader BHI movement uses the internet to spread its message. In light of this research gap, this report examined 180 Facebook pages with large followings close to the more extreme sections of the BHI movement, further evaluating their scope, reach, longevity, activity, geographic location, typology, and major narratives. This study finds that: • Facebook pages are an especially popular way for extremist adherents of the BHI movement to reach a significant audience without being subject to content removal, takedowns, and strict service enforcement. Facebook’s record of success has several discrepancies, especially regarding enforcement against broader antisemitic narratives beyond Holocaust denial and with lesser-known hate groups and movements. • BHI extremist pages examined in this study are administrated across four continents and, on average, can maintain a presence on Facebook and avoid account removal for over five years, allowing them ample time and opportunity to accrue thousands of followers. The ability to establish a long-term presence on a major platform like Facebook increases the potential for audience engagement and opportunities to recruit and radicalize new members. • BHI pages consistently publish a range of antisemitic content and narratives, the most common of which consistently refers to white Jews as “impostors,” emphasizes the connection between Jews and Satan and adds a modern twist on traditional conspiracies of blood libel, arguing Jews are responsible for large-scale organ trafficking operations—among others. While the number of BHI pages posting antisemitic content decreased after October 7, the overall popularity of these pages continued to increase. These contradictory changes signal an improvement in Facebook’s ability to take down easily recognizable antisemitic content, such as Jews worship Satan, or recycled Nazi propaganda. Still, Facebook struggles to remove content that excludes explicit calls to violence or, alludes to conspiracies of blood libel or comparing Jews to rats, parasites, and others. • The frequency, longevity, and large follower bases of BHI extremist pages that publish antisemitic and other hateful content targeting protected classes such as the LGBTQ+ community suggest gaps in Facebook’s enforcement of its Community Standards, particularly its anti-hate speech and Dangerous Organizations and Individuals (DOI) policies. These findings suggest that antisemitic content congruent with extremist interpretations of the BHI ideology has a haven on Facebook–a social media platform with over 3 billion active monthly users.[5]  

Washington DC:  Program on Extremism at George Washington University, 2024. 52p.

THE IMPLICATIONS OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY: SHIFTING THE OFFENSE- DEFENSE BALANCE

By: Jennifer Tang, Tiffany Saade, and Steve Kelly

Cutting-edge advances in artificial intelligence (AI) are taking the world by storm, driven by a massive surge of investment, countless new start-ups, and regular technological breakthroughs. AI presents key opportunities within cybersecurity, but concerns remain regarding the ways malicious actors might also use the technology. In this study, the Institute for Security and Technology (IST) seeks to paint a comprehensive picture of the state of play— cutting through vagaries and product marketing hype, providing our outlook for the near future, and most importantly, suggesting ways in which the case for optimism can be realized.

The report concludes that in the near term, AI offers a significant advantage to cyber defenders, particularly those who can capitalize on their "home field" advantage and firstmover status. However, sophisticated threat actors are also leveraging AI to enhance their capabilities, making continued investment and innovation in AI-enabled cyber defense crucial. At this time of writing, AI is not yet unlocking novel capabilities or outcomes, but instead represents a significant leap in speed, scale, and completeness.

This work is the foundation of a broader IST project to better understand which areas of cybersecurity require the greatest collective focus and alignment—for example, greater opportunities for accelerating threat intelligence collection and response, democratized tools for automating defenses, and/or developing the means for scaling security across disparate platforms—and to design a set of actionable technical and policy recommendations in pursuit of a secure, sustainable digital ecosystem.

The Institute for Security and Technology, October 2024

Model Legislation to Modernize Anti-KKK Masking Laws for Intimidating Protesters

By Hannah E. Meyers, Ilya Shapiro, Tim Rosenberger

Just as Ku Klux Klan members used white hoods to conceal their identities and terrorize their targets, modern activists are using keffiyehs, Guy Fawkes masks, balaclavas, and other inherently intimidating face coverings. Indeed, face-masking is pervasive among participants in demonstrations that are growing in frequency and disruptiveness. Most recently, the pro-Hamas “protests” that have proliferated across college campuses and city streets involve activists who cover their faces explicitly to make it impossible to determine who is engaged in violence, intimidation, and property destruction. Just as masks emboldened KKK activity a century ago, they are a central feature in the 360% surge in antisemitic incidents since Hamas’s attack on Israel last year.1 New York City experienced about 2,000 protests in the half-year following October 7—including incidents involving more than 10,000 participants illegally blocking bridges and major infrastructure.2 Cities across the country seem to be struggling to maintain order and check the growing number of attacks associated with these events on Jewish owned businesses and other institutions.  There is an obvious and simple answer to protesters’ growing aggressiveness, an answer that proved effective against their forebears in the KKK: denying intimidating and violent protesters the right to conceal their identities via face coverings. Hamas supporters, Antifa, Patriot Front, and others act boldly so long as they can remain anonymous. Stripped of this anonymity and the intimidating power of the keffiyeh and black bandanna, they will be far less likely to engage in criminal behavior.

New York: The Manhattan Institute, 2024. 5p.

‘We Want You To Be A Proud Boy’: How Social Media Facilitates Political Intimidation and Violence

By Paul M. Barrett

The main finding of this report is that social science research reveals that social media platforms can be—and often are—exploited to facilitate political intimidation and violence. Certain features of social media platforms make them susceptible to such exploitation, and some of these features should be changed to reduce the danger. “ The main finding of this report is that social science research reveals that social media platforms can be—and often are— exploited to facilitate political intimidation and violence. ” Based on a review of more than 400 studies published by peer-reviewed journals and think tanks, the report provides a platform-by-platform survey focusing on the particular features of each site that make it susceptible to exploitation by extremists promoting intimidation and violence and/or seeking recruits for their various causes. The report emphasizes that neither subjective observation nor social science research indicates that social media platforms are the sole or even primary cause of political intimidation and violence. Other media and irresponsible political leaders play crucial roles. However, the use of social media can enable or facilitate violence in a fashion that deserves attention and mitigation. Most of this problem—extremism and occasional use of force for political ends—occurs on the political right. But the left is not immune to these pathologies. The platforms discussed in the following pages range from some of the best known, like Facebook and YouTube, to the more recently ascendant TikTok to those on the right-wing fringe, such as Gab, Parler, and 4chan. Among the features, we examine are: • Facebook’s Groups, which helped the sometimes-violent QAnon to grow into a full-blown movement devoted to the delusion that former President Donald Trump has secretly battled “deep state” bureaucrats and Satanic pedophiles.1 • Instagram’s comments function, which has allowed the Iranian government to threaten dissidents with sexual assault and death as a way of silencing them.2 • TikTok’s powerful recommendation algorithm, which in one experiment promoted violent videos, including incitement of students to launch attacks at school.3 After a case study of January 6 by our collaborators at Tech Policy Press, the report concludes with recommendations for industry and government.

NYU Stern Center for Business and Human Rights Leonard N. Stern School of Business 2024. 32p.  

How do Ivorian Cyberfraudsters Manage Their Criminal Proceeds?

By Cristina Cretu-Adatte, Renaud Zbinden, Luca Brunoni, Hazel Bunning, Josselin Wilfred Azi & Olivier Beaudet-Labrecque

This article delves into the intricacies of managing illicit financial gains among Ivorian cyber fraudsters, shedding light on the findings of a field study conducted in Côte d’Ivoire by Swiss and Ivorian research teams. The study involved interviews with cyber criminals, law enforcement officials, and subject matter experts, to answer a specific question: What strategies do Ivorian cyber fraudsters use to manage and launder the criminal proceeds originating from romance scams and sextortion? The results explore the tactics employed by cyber fraudsters to obfuscate illicit financial flows, their organizational structures, and the strategies they employ in managing and using their gains. It confirms certain elements from the scientific literature, in addition to introducing new insights for a better understanding of the processes of money laundering and the use of illicit funds. The article also unravels the multifaceted challenges encountered within the anti-money laundering framework in the context of cybercrime and raises avenues for further reflection and future work to enhance the fight against this scourge.

Eur J Crim Policy Res 30, 359–378 (2024).

Domestic and Child Abuse: DOD Needs to Clarify Guidance on Incident Determination Committee Notifications

By Kristy E. Williams, U.S. Government Accountability Office

Domestic and child abuse can result in devastating consequences for military service members and their families. It also can reduce mission readiness. In fiscal year 2023, DOD recorded 26,978 reports of domestic and child abuse incidents, of which 14,110 met the DOD definition of abuse. House Report 117-397 includes a provision for GAO to review the policies and regulations governing IDCs and the use of decision notification letters. This report (1) describes how military commanders, abuse victims, and alleged abusers may use IDC decisions; and (2) assesses the extent to which the military services have established processes to notify commanders, abuse victims, and alleged abusers of IDC decisions. GAO conducted site visits at four military installations; analyzed random samples of IDC notifications and incident case logs; reviewed DOD and military service guidance; and interviewed DOD, military service, and civilian officials. What GAO Recommends GAO recommends DOD clarify its guidance and expectations on incident determination notification methods and content based on its identification and analysis of associated risks. DOD concurred with GAO’s recommendation.    

Washington, DC: U.S. Government Accountability Office, 2024. 49p.

Model Legislation to Modernize Anti-KKK: Masking Laws for Intimidating Protesters

By Hannah E. MeyersIlya ShapiroTim Rosenberger

 Just as Ku Klux Klan members used white hoods to conceal their identities and terrorize their targets, modern activists are using keffiyehs, Guy Fawkes masks, balaclavas, and other inherently intimidating face coverings. Indeed, face-masking is pervasive among participants in demonstrations that are growing in frequency and disruptiveness. Most recently, the pro-Hamas “protests” that have proliferated across college campuses and city streets involve activists who cover their faces explicitly to make it impossible to determine who is engaged in violence, intimidation, and property destruction. Just as masks emboldened KKK activity a century ago, they are a central feature in the 360% surge in antisemitic incidents since Hamas’s attack on Israel last year. New York City experienced about 2,000 protests in the half-year following October 7—including incidents involving more than 10,000 participants illegally blocking bridges and major infrastructure. Cities across the country seem to be struggling to maintain order and check the growing number of attacks associated with these events on Jewish-owned businesses and other institutions  There is an obvious and simple answer to protesters’ growing aggressiveness, an answer that proved effective against their forebears in the KKK: denying intimidating and violent protesters the right to conceal their identities via face coverings. Hamas supporters, Antifa, Patriot Front, and others act boldly so long as they can remain anonymous. Stripped of this anonymity and the intimidating power of the keffiyeh and black bandanna, they will be far less likely to engage in criminal behavior

New York: The Manhattan Institute, 2024. 5p.

Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots Against Schools

By The United State Secret Service, National Threat Assessment Center

Averting Targeted School Violence: A U.S. Secret Service Analysis of Plots Against Schools examines 67 plots to conduct a school attack that were averted in the United States from 2006 to 2018. The report was released in conjunction with a virtual presentation to more than 13,000 registered education stakeholders representing all 50 states and 64 countries. U.S. Secret Service Director James Murray welcomed participants, and noted specifically to participants the role that everyone has to play in preventing the next tragedy. “The takeaway from this report, and the 67 cases you are about to examine, is that when people come forward to report concerning behaviors, they can and do save lives,” said Director Murray. “That’s the bottom line, here. Bystanders save lives, and the Secret Service stands ready to support you and your communities in helping to reduce targeted violence in the years to come.” Secretary of Homeland Security Alejandro Mayorkas also addressed participants during the event. “Ensuring the safety of children while they are at school is our utmost responsibility,” said Secretary of Homeland Security Alejandro Mayorkas. “It requires us working together through our law enforcement and community partnerships. Many of the tragedies that have occurred in schools could have been prevented, that is why it is so important to establish targeted violence prevention programs, including those that the Secret Service recommends.”

The report identified numerous qualitative key findings and commonalities across the 67 incidents:

  • Targeted school violence is preventable, if communities can identify warning signs and intervene.

  • Schools should seek to intervene with students before their behavior warrants legal consequences.

  • Students were most often motivated to plan a school attack because of a grievance with classmates.

  • Students are best positioned to identify and report concerning behaviors displayed by their classmates.

  • The role of parents and families in recognizing concerning behavior is critical to prevention.

  • School resource officers (SROs) play an important role in school violence prevention.

  • Removing a student from school does not eliminate the risk they might pose to themselves or others.

  • Students displaying an interest in violent or hate-filled topics should elicit immediate assessment and intervention.

  • Many school attack plots were associated with certain dates, particularly in the month of April.

  • Many of the student plotters had access to weapons, including unimpeded access to firearms.

“The National Threat Assessment Center has been studying targeted violence for over 20 years to help our public safety partners stop violence in their communities,” said National Threat Assessment Chief Dr. Lina Alathari. “The research and guidance we publish is focused on prevention, with a particular focus on preventing targeted school violence, and the report released today builds even further on the work we do every day to best position community and school leaders to effectively intervene before the next potential tragedy.” Since the 1990s, the Secret Service NTAC has been conducting research, training, consultation, and information sharing on threat assessment and the prevention of targeted violence. NTAC has studied attacks directed at government agencies and officials, workplaces, schools, colleges, universities, and other public spaces. This systematic approach identifies individuals who may be exhibiting threatening or concerning behavior and assesses the risk posed by the individual. The academic research-based approach to studying the behaviors associated with acts of violence supports the Secret Service's protective mission and our nation's effort to better protect our communities. The Secret Service will continue to build on our threat assessment methodology and provide research findings and guidance to public and private sectors, to enhance the prevention efforts of those charged with safeguarding our nation.

Washington, DC: United States Secret Service, 2021. 64p.