Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Violence against children in the European Union - Current situation

By Martina Prpic with Melissa Eichhorn

Children are human beings with rights and dignity. Children's rights are human rights. Owing to their fragility and vulnerability, children also require specific protection, however, which involves providing them with an environment where they are safe from any situation that could potentially expose them to abuse. Violence against children, as defined in Article 19 of the United Nations Convention on the Rights of the Child, can take many forms (physical, sexual or emotional abuse or neglect) and can take place in different settings, such as at home, at school, in institutions, online, etc. Most child abusers are familiar to their victims. The short- and long-term consequences of abuse in terms of human, economic and social costs can be severe and extremely harmful. The extent of violence against children in the EU is difficult to assess, but current estimates give cause for great concern. The nature of the problem depends on various factors, including the personality profiles of victims and perpetrators as well as their surroundings. Certain categories of children, such as those with disabilities, those living in special institutions or those who are unaccompanied migrants, are particularly vulnerable. However, violence is avoidable and preventable. Effective policies to address this problem require a multi-sectoral approach involving different stakeholders at various levels. At international level, the United Nations and the Council of Europe have taken a number of measures to safeguard the rights of children, and more specifically to protect them from violence. The Convention on the Rights of the Child is crucial in this effort. According to its Article 19, children are entitled to protection from all forms of violence, and Member States are required to take all appropriate measures to ensure this protection. In recent years, the EU has been stepping up its measures to protect children. With the entry into force of the Lisbon Treaty, child protection has been recognised as a specific EU goal. While Member States are primarily responsible for child protection systems, the EU also plays an important role, since it is required to promote initiatives to protect children's rights. Its actions directly influence the relevant laws and policies implemented by the Member States in this area. Various parties are involved in raising awareness about violence against children, the importance of effective EU support for national child protection initiatives and the mainstreaming of child protection. Through its numerous initiatives, such as the continuously renewed EU strategy on the rights of the child and the 2024 Commission recommendation on integrated child protection systems, the EU continues to emphasise its commitment to protecting children and supporting Member States' actions and the exchange of best practice.

Brussels: EPRS | European Parliamentary Research Service, 2024. 31p.

Social media: the good, the bad, and the ugly

By Joint Select Committee on Social Media and Australian Society

This report focusses on the impacts of social media and Australian society. It examines the influence of social media on users' health and wellbeing, particularly on vulnerable cohorts of people, but also how social media can provide users with positive connection, a sense of community, a place for expression and instant access to information and entertainment.

The Committee heard that balancing these conflicting realities is a wicked problem.

The report addresses both the need for immediate action, and the need for a sustained digital reform agenda. It supports protecting Australians through a statutory duty of care by digital platforms, education support and digital competency, greater protections of personal information, independent research, data gathering and reporting, and giving users greater control over what they see on social media.

This report puts Big Tech on notice—social media companies are not immune from the need to have a social licence to operate.

Recommendations for the Australian Government

  1. Consider options for greater enforceability of Australian laws for social media platforms.

  2. Introduce a single and overarching statutory duty of care onto digital platforms for the wellbeing of their Australian users.

  3. Introduce legislative provisions to enable effective, mandatory data access for independent researchers and public interest organisations, and an auditing process by appropriate regulators.

  4. As part of its regulatory framework, ensures that social media platforms introduce measures that allow users greater control over what user-generated content and paid content they see by having the ability to alter, reset, or turn off their personal algorithms and recommender systems.

  5. Prioritise proposals from the Privacy Act review relating to greater protections for the personal information of Australians and children.

  6. Any features of the Australian Government's regulatory framework that will affect young people be codesigned with young people.

  7. Support research and data gathering regarding the impact of social media on health and wellbeing to build on the evidence base for policy development.

  8. One of the roles of the previously recommended Digital Affairs Ministry should be to develop, coordinate and manage funding allocated for education to enhance digital competency and online safety skills.

  9. Reports to both Houses of Parliament the results of its age assurance trial.

  10. Industry be required to incorporate safety by design principles in all current and future platform technology.

  11. Introduce legislative provisions requiring social media platforms to have a transparent complaints mechanism.

  12. Ensures adequate resourcing for the Office of the eSafety Commissioner to discharge its evolving functions.

Parliament of Australia, 18 NOV 2024

Temporal and spatial trends of fentanyl co-occurrence in the illicit drug supply in the United States: a serial cross-sectional analysis

By Tse Yang Lim, Huiru Dong, Erin Stringfellow, Zeynep Hasgul, Ju Park, Lukas Glos, Reza Kazemi, and Mohammad S Jalali

Fentanyl and its analogs contribute substantially to drug overdose deaths in the United States. There is concern that people using drugs are being unknowingly exposed to fentanyl, increasing their risk of overdose death. This study examines temporal trends and spatial variations in the co-occurrence of fentanyl with other seized drugs.

Methods

We identified fentanyl co-occurrence (the proportion of samples of non-fentanyl substances that also contain fentanyl) among 9 substances or substance classes of interest: methamphetamine, cannabis, cocaine, heroin, club drugs, hallucinogens, and prescription opioids, stimulants, and benzodiazepines. We used serial cross-sectional data on drug reports across 50 states and the District of Columbia from the National Forensic Laboratory Information System, the largest available database on the U.S. illicit drug supply, from January 2013 to December 2023.

Findings

We analyzed data from 11,940,207 samples. Fentanyl co-occurrence with all examined substances increased monotonically over time (Mann-Kendall p < 0.0001). Nationally, fentanyl co-occurrence was highest among heroin samples (approx. 50%), but relatively low among methamphetamine (≤1%), cocaine (≤4%), and other drug samples. However, co-occurrence rates have grown to over 10% for cocaine and methamphetamine in several Northeast states in 2017–2023.

Interpretation:

Fentanyl co-occurs most commonly with heroin, but its presence in stimulant supplies is increasing in some areas, where it may pose a disproportionately high risk of overdose.

Lancet Reg Health Amicas, . 2024 Sep 27;39:100898. doi: 10.1016/j.lana.2024.100898

The Surprising Decline of Workplace Sexual Harassment Incidence in the U.S. Federal Workforce

By Michael J. Rosenfeld

U.S. Merit Systems Protection Board (USMSPB) surveys document a decline of more than 50 percent between 1987 and 2016 in the percentage of women working for the federal government who have been sexually harassed (narrowly or broadly defined) in the prior two years. This decline has been underappreciated due to the infrequency of USMSPB surveys and the delayed release of the USMSPB report based on the 2016 survey. The decline in workplace sexual harassment of women has taken place across all federal agencies and at all workplace gender balances. While, in 1987, there was a strong positive correlation between male predominance in the workplace and women’s report of sexual harassment, this association was greatly diminished by 2016. The formerly substantial gender divide in attitudes toward sexual harassment was also mostly diminished by 2016. By extrapolating the USMSPB surveys of federal workers to the entire U.S. workforce, I estimate that 4.8 million U.S. women were harassed at work in 2016 (using a narrow definition of harassment) and 7.6 million U.S. women were harassed at work in 1987 when the female workforce was substantially smaller. More than 700 women were sexually harassed at work in the United States in 2016 for every sexual harassment complaint filed with the Equal Employment Opportunity Commission. The observed decline in sexual harassment has implications for theories about law and social change ”

Sociological Science 11: 934-964, 2024.

COCA LEAF AND COCAINE LEGALIZATION IN PERU: EXPLORING THE POTENTIAL IMPACTS

By Nicolás Zevallos Trigoso, Jaris Mujica, and Christian Campos Vásquez

Coca legalization in Peru could reshape the economy, drug control policies, and even the influence of organized crime, but the implications are complex. This report explores how moving from prohibition to a regulated market affects not only the legal framework but also the ground reality for coca growers, consumers, and law enforcement. Legalization doesn’t just mean lifting restrictions; it involves constructing a regulatory structure that acknowledges coca as both a cultural staple and a consumer good.

The study reveals that while legalization could reduce the criminalization of coca production, it also creates new challenges. Ensuring a legal supply chain for coca derivatives, from cultivation to sale, demands extensive state oversight—a task complicated by limited resources and a history of challenges with other legal commodities like timber and gold. Moreover, organized crime could exploit the gaps in regulation, adapting to the legal framework while maintaining parallel illegal operations.

The analysis dives into four major areas of impact: changes in drug policy, shifts in organized crime dynamics, effects on the local economy of coca growers, and potential shifts in consumer patterns. The findings suggest that legalization could reduce repressive policing but require intensified regulatory control, putting immense pressure on Peru’s state capacity. Organized crime may also adapt to the new structures, blending illegal activities with legal coca businesses.

This study also highlights lessons from other industries that have moved from illicit to regulated markets, providing a balanced view of possible outcomes. While coca legalization could offer a path away from prohibition’s punitive approach, the transition to a regulated market could mean ongoing challenges.

Geneva: Global Initiative Against Transnational Organized Crime, 2024 24p.

Breaking Klad: Russia's Dead Drug Revolution

By Max Daly ̵ Patrick Shortis

There has been a groundbreaking shift in the global drug trade, pioneered in Russia and now spreading globally. Unlike traditional drug trafficking models, this system leverages darknet markets and cryptocurrency for anonymous transactions, allowing buyers to retrieve drugs from hidden physical locations, or “dead drops,” rather than direct exchanges. Driven by large platforms such as Kraken, Mega, and Blacksprut, Russian darknet markets control 93% of the global share, generating approximately $1.5 billion in revenue in 2023 alone. This dominance marks a new era for organized crime, with Russia’s digital drug economy vastly surpassing traditional Western darknet markets in scope and influence.

The rise of Russia’s dead drop drug trade stems from several unique national factors: restrictive anti-drug policies, strained Western trade relations, and a strong technological foundation. Enabled by these conditions, the dead drop model has reshaped how drugs are distributed in Russia. Drug transactions now involve no face-to-face interactions; instead, orders are placed online, paid for with cryptocurrency, and retrieved from secret locations across cities within hours. This system, offering convenience and anonymity, has seen synthetic drugs—especially synthetic cathinones like mephedrone—overtake traditional imported substances like cocaine and heroin in Russia. As the report highlights, these potent synthetic drugs are cheap, easy to manufacture, and readily distributed through Russia’s vast delivery networks.

The report further underscores the severe social impacts of this model on Russian society, particularly among young people. Youth are drawn into this high-tech drug economy, often working as couriers or “kladmen” for online shops—a job that comes with high risks, including violence, criminal charges, and addiction. Violence has become endemic in the system, with enforcers, known as “sportsmen,” meting out harsh punishments for couriers suspected of theft or negligence. This pervasive violence, combined with the easy availability of highly addictive synthetic drugs, is fueling a public health crisis and contributing to rising incarceration rates among young Russians.

Beyond Russia, the report warns that this drug trade model is now expanding across borders, posing public health and security risks. It’s affecting Russian youth heavily, leading to violence, criminalization, and increased synthetic drug dependence. Understanding Russia’s darknet markets offers insight into the future of drug trafficking worldwide. Authorities and international bodies must adapt to address the growing influence of this high-tech, anonymous, and highly organized trade system.

Geneva: Global Initiative Against Transnational Organized Crime, 2024. 53p.

The Fifth Wave: Organized Crime in 2040

By Phil Williams

By 2040, organized crime may thrive like never before, exploiting climate crises, geopolitical conflicts, and technological advancements. Our latest report reveals a chilling forecast where criminal networks operate as shadow governments, shielded by authoritarian regimes and empowered by rapid technological evolution.

This “fifth wave” of organized crime, as coined by author Phil Williams, will capitalize on scarcity markets, leveraging disruptions in essential resources like water, minerals, and energy caused by climate change. Criminal networks are expected to infiltrate legitimate markets, blurring lines between lawful and illicit activities and using scarcity as a driving force for growth.

The report suggests that by leveraging emerging tools such as artificial intelligence, autonomous vehicles, and 5G technology, criminal organizations will achieve new levels of sophistication, making it difficult for law enforcement to counter their reach and resilience. Meanwhile, geopolitical tensions are likely to exacerbate the situation, as some authoritarian regimes utilize criminal networks as extensions of state power, offering them safe havens and strategic support in exchange for destabilizing activities abroad.

The findings raise urgent questions about global readiness to combat organized crime’s possible evolution. “The Fifth Wave” challenges policymakers, law enforcement agencies, and international organizations to rethink their approach to organized crime in a rapidly shifting world. It underscores the importance of proactive strategies that go beyond traditional crime-fighting tactics, advocating for comprehensive international collaboration, adaptive policy-making, and innovative technology to address this deeply entrenched threat.

As crime increasingly infiltrates legal economies, emerging as a powerful economic and social force, international collaboration and innovative strategies will be vital to mitigate this emerging threat. This threat requires an unprecedented global response.

Geneva: Global Initiative Against Transnational Organized Crime, 2024. 30p.

Temporal and Spatial Trends of Fentanyl Co-Occurrence in The Illicit Drug Supply in The United States: a Serial Cross-Sectional Analysis

By Tse Yang Lim , Huiru Dong , Erin Stringfellow , Zeynep Hasgul , Ju Park , Lukas Glos , Reza Kazemi , Mohammad S Jalali 

Fentanyl and its analogs contribute substantially to drug overdose deaths in the United States. There is concern that people using drugs are being unknowingly exposed to fentanyl, increasing their risk of overdose death. This study examines temporal trends and spatial variations in the co-occurrence of fentanyl with other seized drugs.

Methods

We identified fentanyl co-occurrence (the proportion of samples of non-fentanyl substances that also contain fentanyl) among 9 substances or substance classes of interest: methamphetamine, cannabis, cocaine, heroin, club drugs, hallucinogens, and prescription opioids, stimulants, and benzodiazepines. We used serial cross-sectional data on drug reports across 50 states and the District of Columbia from the National Forensic Laboratory Information System, the largest available database on the U.S. illicit drug supply, from January 2013 to December 2023.

Findings

We analyzed data from 11,940,207 samples. Fentanyl co-occurrence with all examined substances increased monotonically over time (Mann-Kendall p < 0.0001). Nationally, fentanyl co-occurrence was highest among heroin samples (approx. 50%), but relatively low among methamphetamine (≤1%), cocaine (≤4%), and other drug samples. However, co-occurrence rates have grown to over 10% for cocaine and methamphetamine in several Northeast states in 2017–2023.

Interpretation: 

Fentanyl co-occurs most commonly with heroin, but its presence in stimulant supplies is increasing in some areas, where it may pose a disproportionately high risk of overdose.

Lancet Reg Health Amicas, 2024 Sep 27;39:100898. doi: 10.1016/j.lana.2024.100898

Social Media: The Root Cause of Rising Youth Self‐Harm or a Convenient Scapegoat?

By Helen Christensen, Aimy Slade, Alexis Whitton

Recent events have reignited debate over whether social media is the root cause of increasing youth self‐harm and suicide. Social media is a fertile ground for disseminating harmful content, including graphic imagery and messages depicting gendered violence and religious intolerance. This proliferation of harmful content makes social media an unwelcoming space, especially for women, minority groups, and young people, who are more likely to be targeted by such content, strengthening the narrative that social media is at the crux of a youth mental health crisis. However, the parallel rise in social media use and youth mental health problems does not imply a causal relationship. Increased social media use may be a correlate, exacerbating factor, or a consequence of rising trends in youth self‐harm, which may have entirely separate causes. Despite its potential negative impacts, social media is also a source of information and support for young people experiencing mental health problems. Restricting young people's access to social media could impede pathways for help‐seeking. This complexity highlights the need for a considered approach.

Recommendations  

  • Understand why some individuals are more susceptible to social media harms.

  • Assess alternative explanations for youth self-harm trends.

  • Mitigate artificial intelligence (AI)-related risks.

  • Evaluate interventions that restrict social media and ensure they are evidence-based.

Medical Journal of Australia Volume221, Issue10 November 2024 Pages 524-526

Unauthorized Access: The Crisis in Online Privacy and Security

By Robert H. Sloan • Richard Warner

 Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues about online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policymakers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

Boca Raton, FL;  London; New York;  CRC Press, 2017. 401p.

The Philosophy of Online Manipulation

Edited By Fleur Jongepier, Michael Klenk

Are we being manipulated online? If so, is being manipulated by online technologies and algorithmic systems notably different from human forms of manipulation? And what is under threat exactly when people are manipulated online? This volume provides philosophical and conceptual depth to debates in digital ethics about online manipulation. The contributions explore the ramifications of our increasingly consequential interactions with online technologies such as online recommender systems, social media, user-friendly design, microtargeting, default settings, gamification, and real-time profiling. The authors in this volume address four broad and interconnected themes: What is the conceptual nature of online manipulation? And how, methodologically, should the concept be defined? Does online manipulation threaten autonomy, freedom, and meaning in life, and if so, how? What are the epistemic, affective, and political harms and risks associated with online manipulation? What are legal and regulatory perspectives on online manipulation? This volume brings these various considerations together to offer philosophically robust answers to critical questions concerning our online interactions with one another and with autonomous systems. The Philosophy of Online Manipulation will be of interest to researchers and advanced students working in moral philosophy, digital ethics, the philosophy of technology, and the ethics of manipulation.

London; New York: Routledge, 2022. 425p.

“I wanted them all to notice” Protecting children and responding to child sexual abuse within the family environment

By The Child Safeguarding Practice Review Panel

This report describes very shocking things about the lives, distress and pain of children who had horrific abuse perpetrated on them, by adults who should have cared for them and kept them safe. What is even more disturbing is that safeguarding agencies were unable to listen, hear and protect these children. This report, and the evidence on which it is based, stands as both an invitation and a challenge to government and professionals, to respect and recognise the voices and experiences of the children at the heart of this review, so that children in the future might receive the help and protection that should be their undeniable right. Forty years on from the publication of the Cleveland Report (1988), we must ask why the sexual abuse of children in the family environment provokes undoubted and profound professional unease, and in so doing, systematically silences and shuts out children from the protection and support they need. More recently the Independent Inquiry into Child Sexual Abuse (IICSA) evidenced the countless ways in which organisations, professionals and government have too often denied and deflected attention from the realities of child sexual abuse. This was powerfully demonstrated in the courageous testimonies of adult survivors in IICSA’s Truth Project. Over the past 20 years or so, the light on the sexual abuse of children within families has gradually dimmed. We have witnessed a worrying evaporation of the skills and knowledge that professionals (leaders and practitioners) must have to work confidently and sensitively in this complex area of practice. This dilution of focus and expertise may be partly explained by the greater public and professional attention on the sexual abuse of children in institutions, by ‘famous’ people and on the sexual exploitation of children outside their home. This was undoubtedly urgently required, but it may also have drawn our eyes away from the more common experience for children, of sexual abuse in their families. Despite commonalities between different types of sexual abuse, the ‘othering’ and moral outrage that can accompany media attention on extra-familial sexual abuse has perhaps distracted attention from the more commonplace nature of familial abuse. In turning our attention away from the latter, we have undermined the confidence and capability of professionals to identify and respond to sexual abuse in families.

In over a third of the reviews, the people who harmed children (98% of whom were men) were known to pose a risk of sexual harm. The risk of harm was known (and often over many years) but ignored, denied or deflected. Therefore, it is often not a matter of professionals not knowing about the risk of abuse, but rather of a system that simply does not see, notice and comprehend this type of risk. The review highlights too that shame, fear and concern about betraying their families means that children struggle to tell others what is happening. A profound change is overdue in how professionals, in their different roles, engage with and talk to children about abuse. This involves wholesale change in training, supervision and leadership. These challenges are not about the failings of individuals or one agency to do their job. They are systemic and of a multi-agency nature. This is emphasised by the fact that in 2022/23 just 3.6% of children on child protection plans were there because of a primary concern about child sexual abuse (and tellingly this is at its lowest for a very long time). This may be because of institutionalised avoidance and disinclination to name sexual abuse as a concern, and also because safeguarding agencies are failing to notice when children are at risk of this form of harm. It may also reflect a system that too often is criminal justice led. A national strategic response, led by government, is needed. This will involve investment in better working together, not only between the trinity of safeguarding partners (local authorities, police and health) but also with schools and other education providers, with the criminal and family justice system (including probation), and with the third sector. The voices and testimonies of the children at the heart of this report make plain that we cannot turn our minds away from acknowledging the reality of sexual abuse for too many children. The child whose quote forms this review’s title reminds us of our responsibilities to notice what is happening to children. If we do not, then those perpetrating abuse will continue to wield their corrosive and abusive power in many children’s lives.

London: Child Safeguarding Practice Review Panel, 2024. 139p.

Anti-Social Norms

By Leopoldo Fergusson, José-Alberto Guerra, and James Robinson

Since formal rules can only partially reduce opportunistic behavior, third-party sanctioning to promote fairness is critical to achieving desirable social outcomes. Social norms may underpin such behavior, but they can also undermine it. We study one such norm the “don’t be a toad” norm, as it is referred to in Colombia that tells people to mind their own business and not snitch on others. In a set of fairness games where a third party can punish unfair behavior, but players can invoke the “don’t be a toad” norm, we find that the mere possibility of invoking this norm completely reverses the benefits of third-party sanctioning to achieve fair social outcomes. We establish this is an anti-social norm in a well-defined sense: most players consider it inappropriate, yet they expect the majority will invoke it. To understand this phenomenon we develop an evolutionary model of endogenous social norm transmission and demonstrate that a payoff advantage from adherence to the norm in social dilemmas, combined with sufficient heterogeneity in the disutility of those who view the norm as inappropriate, can generate the apparent paradox of an anti-social norm in the steady-state equilibrium. We provide further evidence that historical exposure to political violence, which increased the ostracization of snitches, raised sensitivity to this norm.

Chicago: University of Chicago, The Becker Friedman Institute for Economics (BFI) , 2024. 57p.

Crypto Tax Evasion

By Tom G. Meling, Magne Mogstad, and Arnstein Vestre

We quantify the extent of crypto tax noncompliance and evasion, and assess the efficacy of alternative tax enforcement interventions. The context of the study is Norway. This context allows us to address key measurement challenges by combining de-anonymized crypto trading data with individual tax returns, survey data, and information from tax enforcement interventions. We find that crypto tax noncompliance is pervasive, even among investors trading on exchanges that share identifiable trading data with tax authorities. However, since most crypto investors owe little in crypto-related taxes, enforcement strategies need to be well-targeted or cheap for benefits to outweigh costs.

Chicago: University of Chicago, The Becker Friedman Institute for Economics (BFI) , 2024. 69p.

Criminal Record Stigma in the Labor Market for College Graduates: A Mixed Methods Study

By Michael Cerda-Jara and David J. Harding

One of the primary ways in which contact with the criminal legal system creates and maintains inequality is through the stigma of a criminal record. Although the negative effects of the stigma of a criminal record are well-documented, existing research is limited to the low-wage labor market. Through a job application audit design, this study examines the role of criminal record stigma in the labor market for recent college graduates across Black, Latino, and white men. We find that criminal record stigma has a large effect among white college-educated men but not among Black or Latino men and find no evidence that earning a college degree after the record mitigates criminal record stigma. In-depth interviews with college-educated men with a criminal record show that the criminal record stigma has effects beyond the initial application stage, as many reported provisional job offers being rescinded following a criminal background check, leading participants to limit the jobs to which they applied

Sociological Science 11: 42-66.2024

Dirty Money: Assessing the vulnerability of financial institutions in the Balkans to illicit finance

By Dardan Kocani

Despite efforts to prevent illicit finance – such as the adoption of international frameworks, Financial Action Task Force (FATF) standards and the EU’s anti-money laundering (AML) directives – financial institutions in the Western Balkans remain highly vulnerable to sophisticated criminals and the inherent risks in the formal financial system. Financial institutions such as banks, microfinance institutions, cryptocurrency services and money transfer services are frequently exploited by criminals to move illicit money across borders.

This report delves into the structural weaknesses and vulnerabilities that facilitate money laundering in the Western Balkans. One major insight is the impact of cryptocurrency, where regulatory shortcomings enable anonymous, cross-border transactions that are hard to trace. Financial technology, while promising innovation, also introduces fresh risks, especially where compliance and monitoring frameworks have yet to catch up. With no centralized registry for politically exposed persons (PEPs) or beneficial owners, financial institutions often lack critical information, inadvertently providing cover for criminal actors.

The study identifies specific methods used to launder money, such as smurfing through bank accounts, taking out suspicious bank loans, engaging in real estate purchases, and employing frontmen. Notable cases in the region expose systemic vulnerabilities in banks, where criminal actors leverage insider support or regulatory gaps to move substantial amounts undetected. Furthermore, public-private partnerships in AML enforcement remain insufficient, creating weak links that are frequently exploited.

This report provides strategic recommendations for governments, financial institutions and non-state actors in the region to address these gaps, emphasizing the need for robust inter-agency collaboration, stronger regulatory frameworks, and consistent training for AML officers. The region needs a heightened, collaborative effort to prevent local financial institutions from becoming conduits for transnational organized crime and dirty money laundering.

Geneva: Global Initiative Against Transnational Organized Crime (GI-TOC)’s Observatory of Illicit Economies in South Eastern Europe. 2024. 40p.

Mapping of Programmes for Perpetrators of Domestic Violence in Central Asia

By Organization for Security and Co-operation in Europe

This publication was prepared as part of the Organization for Security and Co-operation’s (OSCE) Gender Issues Programme project “WIN for Women and Men: Strengthening Comprehensive Security through Innovating and Networking for Gender Equality”, in co-operation with the United Nations Population Fund’s (UNFPA) Regional Office for Eastern Europe and Central Asia. This mapping is based on a combination of a desk review and interviews with key stakeholders in each of the five countries in Central Asia. The results of the mapping are presented first as regional trends and tendencies, followed by findings per country. Programs aimed at changing the violent behaviour of perpetrators are important elements in preventing gender-based violence and ending impunity. The aim of this document is to look into existing programs and trends and offer a set of recommendations for further engagement in Central Asia.

Vienna: OSCE, 2024. 27p.

A scoping study of crime facilitated by the metaverse

By Juliana Gómez-Quintero, Shane D. Johnson, Hervé Borrion, and Samantha Lundrigan

The metaverse is an emerging convergence of technologies (e.g., virtual reality and blockchains) that enables users to experience mixed/extended realities for various legitimate purposes (e.g., gaming, tourism, manufacturing and education). Unfortunately, the crime and security implications of emerging technologies are often overlooked. To anticipate crimes that the metaverse might facilitate, we report the findings of a nominal group technique (NGT) study, which involved a state-of-the-art scoping review of the existing literature and elicitation exercises with two groups of experts (one a diverse group from the UK and Europe, the other representing international law enforcement) with a wide range of expertise. A total of 30 crime threats were identified in the literature or by participants. The elicitation exercises also explored how harmful, frequent, achievable and defeatable participants anticipated that the crimes identified would be. Ratings for these aspects were largely consistent across the two samples, with crimes of a sexual nature (e.g., child sexual abuse material), and crimes against the person (e.g., hate crime) being rated as presenting the highest future risks (i.e. being high harm and high frequency) and being the most difficult to address. The findings illuminate understanding of the most (and least) harmful and likely crime threats the metaverse could facilitate and consequently help stakeholders to prioritise which offences to focus on. In discussing how the crime threats might be addressed, we consider roles and responsibilities and how theory about the management of physical places might inform crime prevention in the metaverse(s).

Futures, Volume 157, March 2024, 103338

Profiling consumers who reported mass marketing scams: demographic characteristics and emotional sentiments associated with victimization

By Marguerite DeLiema and Paul Witt

We examine the characteristics of consumers who reported scams to the U.S. Federal Trade Commission. We assess how consumers vary demographically across six scam types, and how the overall emotional sentiment of a consumer’s complaint (positive, negative, neutral/mixed) relates to reporting victimization versus attempted fraud (no losses). For romance, tech support, and prize, sweepstakes, and lottery scams, more older than young and middle-aged adults reported victimization. Across all scam types, consumers classified as Black, Hispanic, and Asian/Asian Pacific Islander were more likely than non-Hispanic white consumers to report victimization than attempted fraud. Relative to complaints categorized as emotionally neutral or mixed, we find that emotionally positive complaints and emotionally negative complaints were significantly associated with victimization, but that these relationships differed by scam type. This study helps identify which consumer groups are affected by specific scams and the association between emotion and victimization.

Security Journal (2024) 37:921–964

Identifying trends and patterns in offending and victimization on Snapchat: A rapid review

By Kelly Huie, Michelle Butler, & Andrew Percy

Few studies have examined crime on Snapchat despite its popularity and growing accounts of victimization occurring on the application. This study addresses this gap in knowledge by conducting a rapid review of crime on Snapchat across 18 databases. The findings indicate this area is under-researched, with only 35 articles eligible for inclusion and fve focusing solely on crime on Snapchat. Nevertheless, eleven types of crimes were identified as occurring on Snapchat, including: blackmail; the sharing of private, sexual material without consent; grooming/solicitation of minors; stalking; posting threatening, intimidating or harassing material; hate crime; sharing offensive, menacing or obscene content; obtaining illicit goods; identity theft; fraud; and hacking. The findings additionally revealed some patterns in offending and victimization that are also discussed.

Security Journal (2024) 37:903–920