Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Mountains of Evidence: The Effects of Abnormal Air Pollution on Crime

By Birzhan Batkeyev David R. DeRemer

We find that air pollution increases crime in a city that ranks in the worst two percentiles worldwide for dirty winter air. Our identification strategy employs distinct geographic features of Almaty, Kazakhstan: cleaner mountain winds and frequent temperature inversions. Using these variables to instrument for PM2.5 air pollution, we estimate a PM2.5 elasticity of the expected crime rate more than four times as large as similar estimates from cleaner cities. Among crime types, we estimate statistically significant effects of air pollution on property crime, and we find no evidence of an effect on violent crime. These results are consistent with theory that air pollution induces higher discounting rather than aggression. We extend this theory and find that whether air pollution has distinct effects on crimes of varying severity depends on whether the population is more heterogenous in the outside option or in the discount factor. Using microdata on crime severity, we find statistically significant increases in both major and minor crime rates from air pollution, and we fail to reject common PM2.5 elasticities of minor and major crime rates. The greater scale of major crimes implies that they contribute more to the total crime rate increase from air pollution. 

Accepted manuscript for the Journal of Economic Behavior & Organization 2023.  

Too Polluted to Sin? Dirty Skies, Crime, and Adaptation Responses in Mexico City

By Tatiana Zárate-Barrera

This paper estimates the non-monotonic effects of air pollution on criminal activity in a developing country setting and provides empirical evidence on the potential behavioral responses mediating this relationship. To do so, I combine daily administrative data on crime, air pollution, and sentiment polarity from millions of social media posts in Mexico City between January 2017 and March 2020. The identification strategy relies on highly dimensional fixed-effect models, non-parametric estimations of dose-response functions, and an instrumental variable approach that employs wind speed and wind direction as instruments for air pollution. My results suggest a causal and inverted U-shape relationship between air pollution and crime. Specifically, there is an inflection point after which marginal increases in air pollution negatively affect criminal activity. Exploring the mechanisms behind this relationship, I find that air pollution has the power to shape people’s emotional states and mobility patterns. These results provide important insights for developing countries where pollution levels are dangerously high, and crime is still one of the most pressing issues. In particular, under certain circumstances, environmental regulation tailored to reduce air pollution must consider the presence of behavioral responses and these non-linear interactions with criminal activity in their design. 

Unpublished paper, 2021. 48p.

Bets ’n’ Booze Research Summary: Intersections of Gambling and Alcohol Use Among Australian Youth and Young Adult

By Kei Sakata, Rebecca Jenkinson, Brian Vandenberg

This summary explores a study of the social contexts, harms and predictors of co-consumption of gambling and alcohol in youths and young adults (aged 16–35 years) living in Australia.

Findings

  • Around half of survey participants said they ‘often’, ‘very often/almost always’ or ‘always’ consumed alcohol when gambling.

  • Licensed venues create an environment where gambling and alcohol are co-consumed.

  • Socialising with friends or with a spouse/partner and other family member was often the motivation for the co-consumption of gambling and alcohol among youths and young adults.

  • Initiation to gambling and alcohol use at the age of 18, or before reaching the age of 18, was often seen as a rite of passage for young people in Australia.

  • Underage gambling and/or alcohol use was associated with greater gambling and/or alcohol related harms in the participant’s adult life.

  • Despite the majority of the sample being at risk of gambling harm, most respondents did not seek help because they did not believe they needed help.

  • For the small proportion who wanted to seek help but did not, the most common reason was embarrassment.

Recommendations

  • Tougher compliance with laws around underage drinking and gambling in land-based facilities with improved identification processes prior to venue entry.

  • Promoting awareness and education on the co-consumption of gambling and alcohol and possible related harms, which may be protective for young people, particularly as they approach the legal age in Australia.

  • Gender-responsive gambling prevention and treatment approaches (e.g. messaging and taglines).

  • Approaches aimed at de-stigmatising public discourse and awareness on harmful gambling to promote help-seeking behaviour by young people

Australian Institute of Family Studies, 2024.

Sudan Conflict Drives Mass Refugee Movement and Fuels Human Smuggling

By Matt Herbert and Emadeddin Badi

On 15 April 2023, Sudan erupted into war, pitting the Sudanese Armed Forces (SAF) against the paramilitary Rapid Support Forces (RSF). Over the last year and a half, the fighting has proven to be tremendously destructive, devastating large swathes of Khartoum and other key economic hubs, displacing nearly 2 million refugees into neighbouring countries, displacing more than 2.2 million refugees into neighbouring countries, and leaving over 8 million people internally displaced within Sudan as of September 2024. There has been little pause in the destruction, and the conflict shows no signs of ending. The war has also started to shape broader patterns of human smuggling and mobility. Along the northern border, the Egyptian imposition of visa requirements on Sudanese refugees has driven a growing reliance on smuggling networks. This in turn has led to an expansion of smuggling operations, particularly through the Halayeb Triangle area. Along the border with Libya, there has been a gradual increase in arrivals over the past eight months. While control of the border area has shifted from the RSF to the SAF, this has not had a significant impact on smuggling dynamics, which remain robust. In western Sudan, the RSF’s seizure of large areas of territory has been accompanied by violent attacks on the civilian population, resulting in mass displacement into Chad. Most refugees travel autonomously, but smuggling networks along the Chad–Sudan border are becoming increasingly important, either to facilitate safe passage through RSF territory or as part of the long-distance movement of Sudanese refugees to northern Niger and southern Libya. Finally, there has been a limited resurgence of migrant and refugee arrivals from Ethiopia and Eritrea along Sudan’s south-eastern border. If these movements continue and expand, they could further shape human smuggling systems through eastern Sudan to Egypt. RSF advances in the south-east – such as the capture of the city of Wad Madani – may have an impact on smuggling networks, but are unlikely to disrupt their operations significantly  

Geneva:  Global Initiative Against Transnational Organized Crime., 2024... 34p.

Children’s Involvement in Organized Violence: Emerging Trends and Knowledge Gaps Based on Evidence From Different Fields and Areas of Expertise

By Gary Risser and Camila Teixeira, with support from Bo Viktor Nylund and Jasmina Byrne.

Throughout much of history, organizations have used violence as a political weapon, exploited it for criminal gain and leveraged it for social change. Children’s involvement in organized violence has persisted equally as long. They have been used and exploited by a range of non-state armed groups (NSAGs) and national armed forces to take part in combat, to commit other forms of violence in the context of armed conflict and to fulfil other purposes. They have also become members of organized criminal groups and, more recently, have been targeted by online networks that promote violence for all manner of causes. . Children in the global polycrisis: Increasing risks of their participation in organized violence? What is organized violence? This working paper uses the term ‘organized violence’ to refer to “the intentional use of physical force, threatened or actual, against another person or against a group or community, that either results in or has a high likelihood of resulting in injury, death, psychological harm, maldevelopment or deprivation. This violent act is committed by a member of a group of three or more people at any time with a common purpose and knowledge violence will be used to pursue it.” For the purposes of this paper, only armed non-state actors are considered. In the United Nations Children’s Fund’s (UNICEF’s) programme and policy work, ‘armed non-state actors’ is used as a broad term that covers all armed groups operating in conflict and non-conflict situations. UNICEF then analyses these groups and places them in a typology based on a set of organizational and contextual characteristics. This working paper and a closed-door round table that preceded it (see Section II below), however, drew on the information and expertise of publications and experts that focus on more delineated subdivisions of armed non-state actors. The purpose of the round table was to bring these communities of experts together to share their insights on the involvement of children in these armed non-state actors, to document emerging commonalities and differences, and to identify areas for future foresight analysis and research. This working paper therefore includes three subsets of violent actors: NSAGs in armed conflict situations, including those who are designated or otherwise labelled as insurgents, terrorists and violent extremists and who usually operate in situations of armed conflict. Organized criminal groups, including street gangs and organizations that traffic in arms, drugs or people. These groups are not typically parties to armed conflict, even though some will be operating in places affected by conflict. Emerging loose networks that may have an online-only or hybrid online/offline presence, an unclear leadership hierarchy and limited rules. These are sometimes referred to as ‘post organizational’ groups. These three subcategories are not mutually exclusive. Some violent groups, for example, may be simultaneously engaged in combat against a government while producing narcotics and loosely coordinating with other branches of the group through social media applications. The vulnerability of children to involvement in organized violence may be getting more complex, or at least may be changing. The world is facing a confluence of multiple global shocks that have cascaded to affect and amplify each other. While most countries were still recovering from the impact of the COVID-19 pandemic, a war in Ukraine which began in 2014 greatly escalated, exacerbating global inflation, energy shortfalls and food insecurity. The latest intensification of hostilities in Israel and the State of Palestine has led to further volatility in the Middle East. Other countries in which conflict has erupted or intensified since 2019 include Ethiopia, the Democratic Republic of the Congo, Mozambique, Myanmar and the Sudan. Meanwhile, the long-term challenge of climate change continues unabated. This convergence of global shocks – sometimes called a ‘global polycrisis’ – has had many harmful effects, some of which may present more serious risks to children. This global dynamic has created or exacerbated a number of conditions which affect children and families locally, including economic hardship, rising political tension, anger towards and fear of migrants, frustration with climate insecurity, and the use of new weapons in conflicts that might eventually spread to other crises. All of these conditions have the potential to amplify tensions that may lead to organized violence. In many cases, these shocks have also taken place in contexts with weak governance and inadequate systems to protect children and their rights, further increasing vulnerabilities. This global context is, furthermore, marked by a diversification and fragmentation of armed actors that pursue old and new causes while choosing to organize and operate in different ways. Some of these armed groups hold territory and challenge the state over governance. The Islamic State achieved this briefly in some locations in Iraq and the Syrian Arab Republic. Meanwhile, armed groups in Haiti and, until recently, El Salvador have continued to pose challenges to governments in particular neighbourhoods or provinces. In Afghanistan, the Taliban, a former NSAG, removed the government and took control of the country, though it is now battling an Islamic State-linked armed group itself. Territorial control can be important to group identity.6 Some armed groups rely on a networked ‘franchise’ structure, calling for different affiliated groups to form, pursue a common cause and launch attacks when advantageous but without coming under a central chain of command. Still others may orchestrate attacks while hiding among local communities or in the anonymity of the online world. Groups in the latter category may pursue this less structured type of organization when they are dispersed, unable to mobilize and hold territory, or uninterested in challenging the government for control. Some groups, including right-wing groups and the Islamic State, have declared this to be a particular strategy in their area of operation. The children involved in organized violence themselves are members of a significant new generation, Generation Z. In many countries, they are the first generation to have been born into and to have grown up in a digital world. They are also a generation that is struggling with increased mental health challenges. They must grapple with misinformation and disinformation in a ‘post-truth’ era, as well as the effects of algorithmic echo chambers that amplify opinions and trends. For some, engagement in digital realms enables greater social interaction, free from stigma or preconceptions. For others, however, the predominance of digital over in-person social interaction could lead to increased isolation and loneliness, feelings compounded by pandemic-driven lockdowns.8 Generation Alpha – people born from 2014 onwards – are the next group that could be drawn into organized violence, though how they will develop during their adolescence and what influences will predominate remains a matter of discussion. The involvement of children in acts of violence does not usually happen overnight. The diversity of individual trajectories suggests that it is necessary to understand the various manifestations of the phenomenon, from children demonstrating curiosity about ideas to their committing a violent act In addition, children’s engagement with violent groups or participation in violent acts is often not preceded by their accepting or adhering to an ideology. We must explore how these situations of child involvement in organized violence unfold through various pathways.   

Florence, Italy:  UNICEF Innocenti – Global Office of Research and Foresight , 2024. 40p.

Youth Radicalisation in Singapore: A Growing Threat in the Digital Age

By Noor Huda Ismail

How can a nation celebrate its progress and connectivity and face a rising threat from within its young population? In Singapore, a city-state known for its public security and educational excellence, the menace of youth radicalization is taking place through online channels. This was illustrated by a recent case involving a self-radicalized 17-year-old, arrested under its Internal Security Act just weeks before he could execute a planned terror attack. How do online platforms turn seemingly ordinary youth into supporters of extremist ideologies?  Singapore, a global hub of progress, connectivity, and education, faces a challenge: youth radicalization through online platforms. A recent report by Singapore's Internal Security Department (ISD) highlighted the increasing vulnerability of young people to extremist ideologies. A 17-year-old self-radicalised Singaporean student was arrested just weeks before he could carry out a planned terror attack in the public housing heartlands. Described in a press release by the ISD on 18 October as a "staunch" supporter of the Islamic State of Iraq and Syria (ISIS), the student had intended to use a kitchen knife or a pair of scissors from his home as a weapon. Despite not having a deeply religious background, he became captivated by ISIS propaganda, ultimately pledging allegiance to the group and expressing a willingness to die for its cause. To be clear, however, pointing fingers at religion, in this case Islam, as the root cause of radicalisation is to bark up the wrong tree. With over two billion adherents worldwide, Islam has made significant contributions to civilization, including advancements in science, art, and philosophy. Those who become radicalised often have a shallow  understanding of Islamic teachings and are misled by distorted and fragmented online sources. Radicalisation involves fundamentally psychological mechanisms, not just religious ones. Under the right conditions, it can affect anyone, regardless of background. For example, the Israel-Palestine conflict shows how a sense of injustice, loss, and identity crisis can drive radicalisation on both sides, with young Palestinians and Israelis alike adopting extremist views out of frustration or fear. Similarly, groups like Hezbollah and countries like Iran exploit historical and geopolitical grievances to draw people into extremist ideologies. The real issue is the misuse of digital platforms, which amplify these distorted narratives and intensify radical views.   

Singapore: RSIS S. Rajaratnam School of International Studies, NTU Singapore, 2024. 4p.

Intersections Between Violence Against Children and Violence Against Women

By WHO - The World Health Organization

There is growing global recognition of the intersections between violence against women and violence against children. The current evidence shows intersections between intimate partner violence against women and violence against children by parents or caregivers, but limited evidence is available on the links between other forms of violence against women and violence against children. Both violence against women by their (male) intimate partners and violence against children by parents or caregivers are widespread globally. This report describes the process used to determine the priorities for research on the intersections between violence against children and violence against women, and the top 10 research questions identified.

Geneva: WHO, 2024. 41p.

Integrity and Independence of Criminal Justice Institutions in the Western Balkans: Police and Prosecution

Edited by Uglejesa Ugi Zvekic and Ioannis Vlassis

Despite reforms, political influence continues to affect prosecutorial and police services across Albania, Bosnia and Herzegovina, Kosovo, Montenegro, North Macedonia, and Serbia (collectively, WB6), hindering effective action against organized corruption. The report provides a detailed examination of police and prosecution services in the region and evaluates the integrity, operational independence, and oversight of these institutions, especially in their role against organized crime and corruption. WB6 countries face challenges like ineffective internal oversight, low conviction rates for high-ranking officials, and limited resources within dedicated anti-corruption divisions within police and prosecution services. This study emphasizes the need for reinforced accountability, resilience, and operational independence to dismantle corruption networks. Among key recommendations, the report advocates for regional cooperation, stronger educational and training programs, and enhanced civil society engagement.

Geneva: Global Initiative Against Transnational Organized Crime, 2024. 91p.

Enhancing Intelligent Surveillance: A Hybrid Deep Learning Approach for Anomaly Detection, Violence Recognition, and Person Re-Identification" 

By Evany Anne Moses,  M. Brindha,  N. Sivaukumaran

In recent years, the demand for intelligent surveillance systems has grown significantly due to the increasing need for enhanced security in public and private spaces. This journal presents a comprehensive approach that integrates advanced deep learning techniques for anomaly detection, violence recognition, and person re-identification in surveillance videos. The proposed system leverages a hybrid model combining ResNet50 and 3D Convolutional Neural Networks (CNNs) to accurately detect violent activities in real time. Additionally, the system includes anomaly detection to identify unusual patterns in the video feed that may signal potential security threats. The system further incorporates YOLO for high-precision object detection, DeepSort for robust tracking, and OpenPose for pose estimation, enabling real-time monitoring and accurate identification of individuals across multiple frames. Experimental results demonstrate that the integrated system outperforms traditional methods in terms of accuracy, efficiency, and scalability, making it a powerful tool for modern surveillance applications. This work highlights the potential of combining multiple deep-learning approaches to create a more effective and reliable surveillance system capable of addressing diverse security challenges.

Unpublished paper, 2024. 34p.

Drivers and deterrents of child sexual offending: Analysis of offender interactions on the darknet

By Heather Wolbers, Timothy Cubitt, Michael John Cahill, Matthew Ball, John Hancock, Sarah Napier and Roderic Broadhurst

This study examined 17 threads on a darknet forum for undetected online and contact child sexual offenders (CSOs) to identify key drivers and deterrents of offending and to inform intervention approaches. CSOs on the forum normalised sexual contact with children while minimising or denying the resulting harm and shifting the responsibility for offending. These cognitive drivers of offending were coupled with access to technology and close engagement with online communities supportive of child sexual abuse. Acknowledgement of the harm to children, feelings of guilt and shame, and concern about being caught by law enforcement or detected by family and friends acted as deterrents to continued offending.

Trends & issues in crime and criminal justice no. 703. Canberra: Australian Institute of Criminology. 2024. 16p

Ridesharing and Taxi Safety: Information on Background Checks and Safety Features [Reissued with revisions on Oct. 25, 2024]

By Elizabeth Repko, Derrick Collins

Ridesourcing and taxi services help meet the transportation needs of many people in the U.S. Advocacy groups and other stakeholders have raised questions about the safety of these services. Sami’s Law, enacted in January 2023, provides for GAO to conduct a study on background check requirements for prospective ridesourcing and taxi drivers, and safety steps taken by ridesourcing and taxi companies. This report describes background checks of prospective ridesourcing and taxi drivers and safety features for drivers and passengers, among other objectives. GAO searched state statutes and regulations to identify states with statewide background check requirements for prospective ridesourcing and taxi drivers. GAO reviewed documents and interviewed officials from five federal agencies, six selected states, and four selected localities. GAO also interviewed representatives from five selected ridesourcing and five taxi companies. GAO selected states and localities based on their oversight of ridesourcing and taxi services, and selected ridesourcing and taxi companies to obtain variation in size and location, among other things. GAO also conducted nongeneralizable intercept surveys to examine if passengers were aware of and used selected safety features. An intercept survey is an in-person data collection method conducted in a public place (such as an airport), where a specific targeted population is asked a series of questions.

GAO-24-107093 2024. 89p.

Crossing the Deepfake Rubicon The Maturing Synthetic Media Threat Landscape

By Di Cooke, Abby Edwards, Alexis Day, Devi Nair, Sophia Barkoff, and Katie Kelly

THE ISSUE

  • In recent years, threat actors have increasingly used synthetic media—digital content produced or manipulated by artificial intelligence (AI)—to enhance their deceptive activities, harming individuals and organizations worldwide with growing frequency.

  • In addition, the weaponization of synthetic media has also begun to undermine people’s trust in information integrity more widely, posing concerning implications for the stability and resilience of the U.S.’s information environment.

  • At present, an individual’s ability to recognize AI-generated content remains the primary defense against people falling prey to deceptively presented synthetic media.

  • However, a recent experimental study by CSIS found that people are no longer able to reliably distinguish between authentic and AI-generated images, audio, and video sourced from publicly available tools.

  • That human detection has ceased to be a reliable method for identifying synthetic media only heightens the dangers posed by the technology’s misuse, underscoring the pressing need to implement alternative countermeasures to address this emerging threat.

CSIS, 2024. 11p.

The Parole Dossier and its Negative Impacts on Prisoner Identity

By Bradley Read

This article suggests that the parole dossier may be working to damage prisoners' sense of their identity. Through the creation of a carceral script which describes a person whom they do not recognise as themselves and which leads to an increased narrative labour. Prisoners' struggle therefore to form a post offence identity with which to navigate a complex process. As identity and its repair, appear instrumental to desistance, elements of the process, such as the dossier, could be putting hopes of rehabilitation at risk. Using the analysis of fifteen prisoner interviews, this article explores a parole process described as undermining agency. A process where risk assessment is perceived poorly and where ultimately the experience can lead to negative impacts on an already fragile self-identity. In conclusion, this article attempts to offer some solutions, to mitigate the negative effects, to maximise the potential impact of the dossier process on future desistance, through the more meaningful involvement of the prisoner at its centre.

Criminology & Criminal Justice, 2024. Online First.

Pornography Exposure and Access Among Young Australians: a Cross-Sectional Study

By  Maree Crabbe, Michael Flood,,  Kelsey Adams

This article aims to explore the extent and nature of Australian young people’s pornography exposure and access.

Methods

Cross-sectional online survey of 1,985 young Australians aged 15–20 years, nationally representative of a range of demographics.

Results

Exposure to pornography was reported by 86% of male and 69% of female participants. Most exposure occurred when participants were alone and at home, regardless of gender. Young men were more likely than young women to seek pornography out and to view it frequently, with over half (54%) of male participants reporting weekly use compared with 14% of female participants. On average, boys and young men saw pornography 3.2 years before their first partnered sexual experience, and girls and young women saw it 2.0 years before theirs.

Conclusions

It is common for young people to see pornography years before their first partnered sexual experience.

Implications for public health

Unintentional and deliberate exposure to pornography is common and frequent among young people. Public health strategies among young people are necessary to address the potential harms associated with pornography use, including gender-based violence and risky sexual practices.

Australian and New Zealand Journal of Public Health Volume 48, Issue 3, June 2024, 100135

Cryptographic security: Critical to Europe's digital sovereignty

By Stefano De Luca with Tristan Marcelin; Graphics: Samy Chahr

By the 2030s, quantum computers might compromise traditional cryptography, putting digital infrastructure at high risk in the European Union (EU) and around the world. Specifically, it is expected that quantum computers' unique capabilities will allow them to solve complex mathematical problems, such as breaking the traditional cryptographic systems used universally. The confidentiality, integrity and authenticity of sensitive data – including health, financial, security and defence information – will be exposed to threats from any actor possessing a sufficiently powerful quantum computer. There is a pressing need for the EU to start preparing its digital assets to face this risk. Post-quantum cryptography (which uses classical computer properties) and quantum cryptography (which uses quantum mechanical properties) are the two types of critical technology able to protect digital infrastructure from quantum computer attacks. Robust post-quantum cryptography algorithms have been identified, but swift and efficient implementation is crucial before malicious actors exploit the power of quantum computers. Experts stress the need for quantum preparedness to be put in place now, with some of them even warning of a 'quantum cybersecurity Armageddon'. Several countries are adopting strategies to address post-quantum cryptography. The EU is working with Member States and the United States to speed up the transition to post-quantum cryptography, and is also exploring long-term quantum cryptography initiatives.

Brussels: EPRS | European Parliamentary Research Service, 2024. 8p.

Money laundering as a service: Investigating business‑like behavior in money laundering networks in the Netherlands

By Jo‑Anne Kramer, Arjan A. J. Blokland·, Edward R. Kleemans, Melvin R. J. Soudijn

In order to launder large amounts of money, (drug) criminals can seek help from financial facilitators. According to the FATF, these facilitators are operating increasingly business-like and even participate in professional money laundering networks. This study examines the extent to which financial facilitators in the Netherlands exhibit business-like characteristics and the extent to which they organize themselves in money laundering networks. We further examine the relationship between business-like behavior and individual money launderers’ position in the social network. Using police intelligence data, we were able to analyze the contacts of 198 financial facilitators who were active in the Netherlands in the period 2016–2020, all having worked for drug criminals. Based on social network analysis, this research shows that financial facilitators in the Netherlands can be linked in extensive money laundering networks. Based on the facilitators’ area of expertise, roughly two main types of professional money laundering networks can be discerned. Some subnetworks operate in the real estate sector, while others primarily engage in underground banking. Furthermore, the application of regression models to predict business-like behavior using individual network measures shows that facilitators with more central positions in the net work and those who collaborate with financial facilitators from varying expertise groups tend to behave more business-like than other financial facilitators.

Trends in Organized Crime (2024) 27:314–341

Organised crime movement across local communities: A network approach

By Paolo Campana, Cecilia Meneghini

This paper explores the structure of organised crime movement across local communities and the drivers underpinning such movement. Firstly, it builds on network analysis to offer a novel methodological approach to empirically and quantitatively study the movement of organised crime offenders across geographical areas. The paper then applies this approach to evidence from Cambridgeshire in the United Kingdom. It reconstructs the movement of organised crime members across local areas based on a large-scale police dataset that includes 41 months of recorded crime events. It identifies organised crime “turf” and “target” areas and then explores the drivers of movement from the former to the latter using Exponential Random Graph Models. Findings confirm that geographical distance matters; however, socio-demographic, urban, economic and crime-related characteristics of communities play a key role. Organised crime group members target urban communities with higher than average illegal market opportunities (proxied by drug-related activity). The work also finds the effect of socio-demographic homophily between turf and target communities, suggesting that organised crime group members might target territories that are similar to their own. While a high level of deprivation makes a community more likely to send organised crime members, its impact on a community’s probability of being a receiver is less clear. Finally, the paper offers a way to identify communities (local areas) at risk of being targeted by criminal organisations, thus providing practitioners with a tool for early interventions

Trends in Organized Crime (2024) 27:286–313

Co-offending networks among members of outlaw motorcycle gangs across types of crime

By David Bright, Giovanni Sadewo, Timothy I. C. Cubitt, Christopher Dowling, Anthony Morgan

Outlaw motorcycle gangs (OMCGs) have become synonymous with organised crime through engagement in criminal activities including illicit drug production and distribution, firearms trafficking, and serious violent crime. These crimes contribute significant social and economic harms in countries that feature a presence from these groups. The current paper uses network analytics to analyse the extent of co-offending within and across established clubs in Australia, including the relative involvement of senior, or office-bearing, members. The majority of affiliates in this sample co-offended with another OMCG affiliate within the sample period, with office bearers, members, nominees and associates represented proportionally among co-offending networks to in the sample at large. However, within these clubs, criminal activities were conducted in small cliques or components of affiliates. This research supports the role of OMCGs as important facilitators of crime, and the role of co-offending in the criminal offending of affiliates. The findings hold important implications for understanding how offending is organised among OMCGs, differences between groups, differing levels of engagement from the club hierarchy

Trends in Organized Crime (2024) 27:263–285

Homicide of Aboriginal and Torres Strait Islander women

By Samantha Bricknell, Hannah Miles

This study uses 34 years of data from the National Homicide Monitoring Program to describe the prevalence and characteristics of homicide of Aboriginal and Torres Strait Islander women, finding Indigenous women experienced a homicide victimisation rate up to seven times the national average.

These data complement the findings from the currently small number of studies about the homicide of Indigenous women and contribute long-term data with which to measure national targets to reduce rates of victimisation and eliminate the circumstances that initiate lethal violence.

Key findings

  • Between 1 July 1989 and 30 June 2023, 476 Aboriginal and Torres Strait Islander women were victims of homicide.

  • 96% of the 473 homicide incidents involving an Indigenous woman were cleared by police.

  • 97% of victims from cleared incidents were killed by someone they knew.

  • 72% of Indigenous women were killed by a current or former male intimate partner, with smaller proportions killed by another family member or a friend or acquaintance (13% each).

  • 92% percent of the male intimate partner offenders were also Indigenous.

  • The homicide of Indigenous women mostly occurred in a private residence, although over a third took place in a community setting, specifically an open area or streetscape. This pattern differs from homicide generally, which less commonly occur in public locations.

  • Around half of the homicides were immediately preceded by some form of domestic conflict or enmity.

Statistical Bulletin 46 Canberra: Australian Institute of Criminology, 2024. 17p.

The interpretation of forensic conclusions by criminal justice professionals: The same evidence interpreted differently

By Elmarije K. van Straalena, Christianne J. de Poota, Marijke Malschd , Henk Elffers

Forensic reports use various types of conclusions, such as a categorical (CAT) conclusion or a likelihood ratio (LR). In order to correctly assess the evidence, users of forensic reports need to understand the conclusion and its evidential strength. The aim of this paper is to study the interpretation of the evidential strength of forensic conclusions by criminal justice professionals. In an online questionnaire 269 professionals assessed 768 reports on fingerprint examination and answered questions that measured self-proclaimed and actual understanding of the reports and conclusions. The reports entailed CAT, verbal LR and numerical LR conclusions with low or high evidential strength and were assessed by crime scene investigators, police detectives, public prosecutors, criminal lawyers, and judges. The results show that about a quarter of all questions measuring actual understanding of the reports were answered incorrectly. The CAT conclusion was best understood for the weak conclusions, the three strong conclusions were all assessed similarly. The weak CATconclusion correctly emphasizes the uncertainty of any conclusion type used. However, most participants underestimated the strength of this weak CAT conclusion compared to the other weak conclusion types. Looking at the self-proclaimed understanding of all professionals, they in general overestimated their actual understanding of all conclusion types.

Forensic Science International, Volume 313, August 2020, 110331