Criminal violence - Property Crime: Fraud - Money laundering - theft and robbery - homicide - rape - extortion - arson — Read-Me.Org -Open Access to All
Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts by Guest User
Workplace technology-facilitated sexual harassment: perpetration, responses and prevention

By Asher Flynn, Anastasia Powell, Lisa Wheildon

This project offers crucial insights to aid Australian employers and policy-makers in understanding and combating workplace technology-facilitated sexual harassment (WTFSH) effectively.

The study featured:

20 in-depth interviews with industry stakeholders

a national survey with over 3,300 Australian adults

focus groups with young adults to identify current gaps in WTFSH response mechanisms.

The findings underscore the significance of the problem, with 1 in 7 Australian adults surveyed reporting they had engaged in WTFSH.

Results also reflect that gender is a key factor in perpetration. Men were more likely to report they had engaged in WTFSH than women, and male-dominated workplaces were associated with much higher rates of WTFSH than workplaces dominated by women.

Sexist and gender-discriminatory attitudes and the endorsement of sexual harassment myths were two of the strongest predictors of engagement in WTFSH. These results emphasise the critical importance of gender-competent leadership in the workplace.

Sydney: Australia's National Research Organisation for Women's Safety (ANROWS) 2024

Simple Burglary of an Inhabited Dwelling, a Crime of Violence?

By Morgyn Young

Recently, Louisiana classified Simple Burglary of an Inhabited Dwelling, when a person is present during the commission of the crime, as a crime of violence. The overwhelming majority in both the House and the Senate voted to deem the crime a crime of violence. Yet, LA. REV. STAT. § 14:60 (Simple Burglary of an Inhabited Dwelling) does not contain an inherently violent element. In this note, the Author takes a deep dive into the Louisiana Code to uncover the foundation needed to classify a crime as a crime of violence. In doing so, it becomes apparent that Louisiana has begun to stray away from a traditional notion of violence. Many of the amendments, including La. Rev. Stat. § 14:60, do not follow conventional notions of violence in that they do not have a nexus to physical injury. This expansion has reached the point where there is no longer a list of attributes that can be used to determine a crime of violence.

Throughout the article, the Author uses Simple Burglary of an Inhabited Dwelling when a person is present as an example to further portray the idea that the Legislature does not follow the crime of violence definition listed in the code, nor is there a readily apparent framework utilized when deeming crimes "violent." To begin, the Author explores how the definition of a crime of violence has grown outside the bounds of the traditional definition of violence by comparing differing "violence" definitions, both past and present. The Author notes that the definition of violence is constantly evolving. However, the Legislature has expanded far past the modern definition. The Author furthers the analysis by examining the different crimes the Legislature has deemed violent compared to La. Rev. Stat. 14:40. Through the study, it becomes clear that the Legislature, as a whole, cannot define violence effectively, nor does the enumerated list under a crime of violence reveal a consistent determination. As in, the Legislature has not plausibly categorized violent crimes. In further explanation, when singling out just the property crimes listed as a crime of violence, there is not a consistent attribute between the crimes listed to determine what escalated each crime to a crime of violence. The Author ends the analysis by attempting to define the elements of La. Rev. Stat. § 14:2, which proves to be quite challenging as the Louisiana Supreme Court has not provided much insight into the framework of classifying a crime. The elements of importance consist of physical force, substantial risk, and the ordinary case of an offense. The Author continues by comparing Louisiana's definition of a crime of violence to the United States Code's definition. The Author points out the resemblance between the two statutes, yet verbiage contained in 18 U.S.C § 16 was deemed unconstitutional. Using both statutes, multiple cases, and burglary statistics the Author further proves the idea that simple burglary of an inhabited dwelling, when a person is present, should not be classified as a crime of violence. As the crime does not entail physical force to the victim, an intent to harm a person, nor is the risk of harm to the victim substantial. Additionally, the offense cannot be correlated with the existing property crimes labeled a crime of violence, and the offense cannot be classified a crime of violence under the definition provided in La. Rev. Stat. § 14:2. Ultimately, this demonstrates the Legislature's sway from a traditional definition of violence and the legislature acting without limitation in classifying crimes as violent. This never-ending expansion or overreaching fuels an ineffective judicial system, ultimately affecting every citizen in some shape or form.

Unpublished paper, 2024. 27p.

Facial Recognition Technology: Current Capabilities, Future Prospects, and Governance.

By National Academies of Sciences, Engineering, and Medicine; Division on Engineering and Physical Sciences; etc

Facial recognition technology is increasingly used for identity verification and identification, from aiding law enforcement investigations to identifying potential security threats at large venues. However, advances in this technology have outpaced laws and regulations, raising significant concerns related to equity, privacy, and civil liberties.

This report explores the current capabilities, future possibilities, and necessary governance for facial recognition technology. Facial Recognition Technology discusses legal, societal, and ethical implications of the technology, and recommends ways that federal agencies and others developing and deploying the technology can mitigate potential harms and enact more comprehensive safeguards.

Washington, DC: National Academies Press, 2024.

Counterfeits on Darknet Markets: A measurement between Jan-2014 and Sep-2015

By: Felix Soldner, Bennett Kleinberg, and Shane D Johnson

Counterfeits harm consumers, governments, and intellectual property holders. They accounted for 3.3% of worldwide trades in 2016, having an estimated value of $509 billion in the same year. While estimations are mostly based on border seizures, we examined openly labeled counterfeits on darknet markets, which allowed us to gather and analyze information from a different perspective. Here, we analyzed data from 11 darknet markets for the period Jan-2014 and Sep-2015. The findings suggest that darknet markets harbor similar counterfeit product types as found in seizures but that the share of watches is higher and lower for electronics, clothes, shoes, and Tobacco on darknet markets. Also, darknet market counterfeits seem to have similar shipping origins as seized goods, with some exceptions, such as a relatively high share (5%) of dark market counterfeits originating from the US. Lastly, counterfeits on dark markets tend to have a relatively low price and sales volume. However, based on preliminary estimations, the original products on the surface web seem to be worth a multiple of the prices of the counterfeit counterparts on darknet markets. Gathering insights about counterfeits from darknet markets can be valuable for businesses and authorities and be cost-effective compared to border seizures. Thus, monitoring darknet markets can help us understand the counterfeit landscape better.

Crime Science (2023) 12:18

The overlap between child sexual abuse live streaming, contact abuse and other forms of child exploitation

By Coen Teunissen and Sarah Napier

We analysed the chat logs of seven Australia-based men who had committed 145 child sexual abuse (CSA) live streaming offences, to examine the overlap between this offending, contact sexual offending and engagement with child sexual abuse material (CSAM).

Four CSA live streaming offenders attempted to travel to offend against victims in person, in that they discussed travelling or actually booked flights in order to meet these children. Offenders also requested or received images and videos of victims they had viewed over live stream, and recorded live streams to produce CSAM.

Travelling to offend against children, use of CSAM and CSA live streaming appear to be interrelated and should be considered by law enforcement as potential risk factors for one another. Further, detection and removal of new CSAM, and scanning of live streams for abusive content, should be a priority for all electronic service providers.

Trends & issues in crime and criminal justice no. 671. Canberra: Australian Institute of Criminology. 2023. 16p.

How to implement online warnings to prevent the use of child sexual abuse material

By Charlotte Hunn, Paul Watters, Jeremy Prichard, Richard Wortley, Joel Scanlan, Caroline Spiranovic and Tony Krone

Online CSAM offending is a challenge for law enforcement, policymakers and child welfare organisations alike. The use of online warning messages to prevent or deter an individual when they actively search for CSAM is gaining traction as a response to some types of CSAM offending. Yet, to date, the technical question of how warning messages can be implemented, and who can implement them, has been largely unexplored. To address this, we use a case study to analyse the actions individuals and organisations within the technology, government, non-government and private sectors could take to implement warning messages. We find that, from a technical perspective, there is considerable opportunity to implement warning messages, although further research into efficacy and cost is needed.

Trends & issues in crime and criminal justice no. 669. Canberra: Australian Institute of Criminology. 2023. 14p.

Online behaviour, life stressors and profit-motivated cybercrime victimisation

By Isabella Voce and Anthony Morgan

This study analyses data from a survey of Australian adult computer users conducted in June 2021 to examine the influence of online routine activities and life stressors on the likelihood of profit-motivated cybercrime victimisation.

Compared with non-victims, victims spent more time online, more frequently engaged in recreational online activities and were more likely to employ higher-risk online practices. Small-to-medium enterprise owners working from home were more likely to be victims. Respondents who had experienced recent increases in financial stress and gambling and negative impacts on interpersonal relationships during the COVID-19 pandemic were also more likely to be a victim of cybercrime.

Being accessible online and a lack of personal and physical guardianship are associated with an increased risk of being a victim, but other factors may influence the susceptibility of computer users to cybercrime victimisation. This has important implications for cybercrime responses

Trends & issues in crime and criminal justice no. 675. Canberra: Australian Institute of Criminology. 2023. 18p.

Understanding fraudulent returns and mitigation strategies in multichannel retailing

By Danni Zhang, Regina Frei, P.K. Senyo, Steffen Bayer, Enrico Gerding, Gary Wills and Adrian Beck

The growth of online retailing has exceeded expectations over the last few years. This has resulted in high product return rates, which retailers are struggling with due to complex and costly returns processing, logistics, and financial implications. Additionally, online returns come with increased opportunities for returns fraud. During the pandemic, new types of returns fraud have emerged and returns fraud rates have increased across all channels. Based on a series of semi-structured interviews with retailers and retail experts, we investigate factors that enable fraudulent returns from consumers' and retailers’ perspectives and outline strategies for retailers to combat product returns fraud in a multichannel environment, leading to a framework for retail fraud. We contribute critical insights to research and practices on understanding and addressing a growing problem that has economic, social and environmental implications.

Journal of retailing and consumer services, Vol.70, 2023. 103145

Risk factors for receiving requests to facilitate child sexual exploitation and abuse on dating apps and websites

By Coen Teunissen, Dana Thomsen, Sarah Napier and Hayley Boxall

This study investigated the risk factors for dating app and website users receiving requests from other users to facilitate child sexual exploitation and abuse (CSEA). It did so by analysing data from a large survey (n=9,987) of dating app and website users residing in Australia.

Dating app and website users who were younger, lived with children, were Indigenous or had a health condition (ie disability) were more likely than other users to be asked to facilitate CSEA. Further, respondents who were more frequent or active dating app/website users, who paid for the dating service or who linked their social media account to their dating profile were also more likely to receive requests for CSEA. These findings can assist online dating companies to implement new features and education messages that protect users and their children from harm.

Trends & issues in crime and criminal justice no. 686. Canberra: Australian Institute of Criminology. 2024. 18p

Futureproof: Security Aesthetics and the Management of Life

Editor(s): D. Asher Ghertner, Hudson McFann, Daniel M. Goldstein

Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard infrastructures and invisible technologies assumed to deliver it: walls, turnstiles, CCTV cameras, digital encryption, and the like. The contributors to Futureproof redirect this focus, showing how security is a sensory domain shaped by affect and image as much as rules and rationalities. They examine security as it is lived and felt in domains as varied as real estate listings, active-shooter drills, border crossings, landslide maps, gang graffiti, and museum exhibits to theorize how security regimes are expressed through aesthetic forms. Taking a global perspective with studies ranging from Jamaica to Jakarta and Colombia to the U.S.-Mexico border ;Futureproof expands our understanding of the security practices, infrastructures, and technologies that pervade everyday life.

Contributors: Victoria Bernal, Jon Horne Carter, Alexandra Demshock, Zaire Z. Dinzey-Flores, Didier Fassin, D. Asher Ghertner, Daniel M. Goldstein, Rachel Hall, Rivke Jaffe, Ieva Jusionyte, Catherine Lutz, Alejandra Leal Martínez, Hudson McFann, Limor Samimian-Darash, AbdouMaliq Simone, Austin Zeiderman

Durham, NC: Duke University Press, 2020. 312p.

Human-Centered Approach to Technology to Combat Human Trafficking

By Julia Deeb-Swihart

Human trafficking is a serious crime that continues to plague the United States. With the rise of computing technologies, the internet has become one of the main mediums through which this crime is facilitated. Fortunately, these online activities leave traces which are invaluable to law enforcement agencies trying to stop human trafficking. However, identifying and intervening with these cases is still a challenging task. The sheer volume of online activity makes it difficult for law enforcement to efficiently identify any potential leads. To compound this issue, traffickers are constantly changing their techniques online to evade detection. Thus, there is a need for tools to efficiently sift through all this online data and narrow down the number of potential leads that a law enforcement agency can deal with. While some tools and prior research do exist for this purpose, none of these tools adequately address law enforcement user needs for information visualizations and spatiotemporal analysis. Thus to address these gaps, this thesis contributes an empirical study of technology and human trafficking. Through in-depth qualitative interviews, systemic literature analysis, and a user-centered design study, this research outlines the challenges and design considerations for developing sociotechnical tools for anti-trafficking efforts. This work further contributes to the greater understanding of the prosecution efforts within the anti-trafficking domain and concludes with the development of a visual analytics prototype that incorporates these design considerations.

Dissertation. Atlanta: Georgia Institute of Technology, 2022.

Decrypting the cryptomarkets: Trends over a decade of the Dark Web drug trade

By Harjeev Kour Sudan, Andy Man Yeung Tai, Jane Kim, and Reinhard Michael Krausz

Introduction: The Dark Web is a subsection of the Internet only accessible through specific search engines, making it impossible to trace users. Due to extensive anonymity, the drug trade on the Dark Web makes regulation complicated. We sought to uncover the scope of the online drug trade on the Dark Web and the impact it may have on the dynamics of global drug trafficking.

Methods: We conducted a literature review to elucidate the availability and distribution of drugs on the Dark Web based on data reported in existing literature (n = 14) between September 2012 and June 2019. We simultaneously collected data about substances and listings from Dark Web cryptomarkets (n = 13) active between August 2022 and January 2023. Data from the literature review and the Dark Web scrape were combined to draw trends in the chronological availability and distribution of drugs between 2012 and 2023.

Results: The data collected from 13 cryptomarkets between late 2022 and early 2023 showed a relative change in substance distribution compared to 2012–2019, with a decrease in prescription drugs (from >20% to <5%) and a doubling of opioid listings (from 5.5% to 9.25%), while no major changes were observed on average during 2012–2019 according to literature.

Conclusions: The Dark Web warrants more attention in the analysis of the global drug trade. Understanding Dark Web drug markets can inform targeted interventions and strategies to reduce drug-related harms, while ongoing research is necessary to anticipate and respond to future changes in the landscape of the illicit drug trade.

Drug Science, Policy and Law Volume 9 January-December 2023

Network embeddedness in illegal online markets: endogenous sources of prices and profit in anonymous criminal drug trade

By Scott W. Duxbury and Dana L. Haynie

Although economic sociology emphasizes the role of social networks for shaping economic action, little research has examined how network governance structures affect prices in the unregulated and high-risk social context of online criminal trade. We consider how over-embeddedness—a state of excessive interconnectedness among market actors—arises from endogenous trade relations to shape prices in illegal online markets with aggregate consequences for short-term gross illegal revenue. Drawing on transaction-level data on 16 847 illegal drug transactions over 14months of trade in a ‘darknet’ drug market, we assess how repeated exchanges and closure in buyer– vendor trade networks nonlinearly influence prices and short-term gross revenue from illegal drug trade. Using a series of panel models, we find that increases in closure and repeated exchange raise prices until a threshold is reached upon which prices and gross monthly revenue begin to decline as networks become over-embedded. Findings provide insight into the network determinants of prices and gross monthly revenue in illegal online drug trade and illustrate how network structure shapes prices in criminal markets, even in anonymous trade environments.

Socio-Economic Review, 2023, Vol. 21, No. 1, 25–50

Economic Analysis of Darknet Drug Trade

By Ojasi Gopikrishna

What are the economics of the cyber drug trade that is rampant across the globe? What are the impacts that an illicit online drug trade can have on the economy? How does the economy take into consideration the unreported transactions on the dark side of the internet and what are the positive and negative implications of a widespread trade like this in these globalizing times? This research paper aims to analyze various data and information to find and conclude how the darknet drug trade has had significant economic impact on the international financial sector. This paper also elaborates on why the black market is highly prevalent in the current times and what are the ill-effects of Darknet, in particular, drug trade on the Darknet. The analysis of economic consequences of unreported dealings is also taken into consideration and elaborated on. The paper sheds light on the bleak and disturbing statistics of involvement of various countries in the online drug ring marketplace with countries like the United States, India and Turkey dealing heavily in the illegal Darknet drug markets. A statistical analysis to determine the economic calculations of the drug trade is depicted and conclusions about the economical structure of the dark net drug trade and markets and its impact through the times is elaborated upon. The ill-effects of the Darknet drug trade are highlighted and conclusions drawn in the paper depict the fluctuating condition of the online illegal drug trade market.

Unpublished paper, 2022.

Synthetic cannabinoid availability on darknet drug markets—changes during 2016–2017

By Andrew Scourfield, Catherine Flick, Jack Ross, David M. Wood, Natalie Thurtle, Darryl Stellmach & Paul I. Dargan

Changes in legislation have affected supply routes of new psychoactive substances such as synthetic cannabinoids with evidence of supply over the darknet. We identified darknet drug markets using an index database and Tor Browser to access markets. We identified SC in product listings using a custom-programmed script. We collected data at bimonthly intervals (August 2016–April 2017). Eleven darknet markets listed SC for sale, the largest number from China, UK, US, Netherlands, and Germany. Formulations available were high purity powder/crystal, smoking preparations and vape preparations. The top five listed compounds from China across the time points were FUB-AMB, ABD-FUBINACA, 5F-NPB-22, MAB-CHMINACA, and NM-2201. 5F-CUMYL4CN-PINACA was unavailable at early time points but emerged during the study. Cost of high purity formulations from China ranged from 1.3 to 3.1 Euro per gram for quantities 1000 g. Europe and North America accounted for 99% smoking preparations predominantly in small packages (<50 g). SC are widely available on the darknet with availability changing over time. High purity formulations are predominantly available from China in quantities up to kilograms with price per gram reducing with increased quantity. Small packages of ready-made smoking mixtures are available from Europe and North America.

Toxicology Communications, 3:1, 7-15, DOI: 10.1080/24734306.2018.1563739 To link to this article: https://doi.org/10.10 , 2019.

The potential for using web surveys to investigate drug sales through cryptomarkets on the darknet

By Alexandra Karden; Julian Strizek

Over the last decade, drug sales through cryptomarkets located on the so-called darknet have received increasing attention. This paper considers how web surveys might be used to provide insights concerning those people who purchase drugs on cryptomarkets. First, it analyses data from the European Web Survey on Drugs (EWSD), with a view to identifying differences between respondents who buy drugs on cryptomarkets and those who acquire drugs from other sources. The study shows that people using cryptomarkets as a usual source of supply were a small group of users in most participating countries, but that proportions differ significantly, and that buyers were more likely to be male and consume more substances on average. Second, the sampling of web survey respondents on the darknet is discussed based on a sampling strategy tested in Austria, highlighting the challenges and opportunities involved in undertaking survey recruitment on the darknet. The paper highlights the importance of building trust, establishing credibility and guaranteeing anonymity, since awareness of privacy issues is seemingly higher among darknet users than surface web users. By doing so, the authors show how people who buy drugs on cryptomarkets might be reached to improve their representation in future web surveys for drug data collection.

Lisbon: European Monitoring Centre for Drugs and Drug Addiction. 2022. 9p.

Balancing Privacy and Free Speech: Unwanted Attention in the Age of Social Media

By Mark Tunick

In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society’s interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a ‘right to be forgotten’, Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.

Abington, Oxon, UK; New York: Routledge, 2015. 229p.

Reconceptualising organised (cyber)crime: The case of ransomware

By Chad Whelan, David Bright, and James Martin

The concept of organised cybercrime has been the subject of much debate over the last decade. Many researchers who have applied scholarly definitions of organised crime to cyber-criminal groups have concluded that such groups are not “organised criminal groups” and do not engage in “organised crime”. This paper adopts a different perspective to argue that certain cyber-criminal groups involved in ransomware can and should be considered organised crime if a more contemporary and flexible framework for conceptualising organised crime is adopted. We make this argument using three primary domains of organised crime first described by von Lampe: criminal activities, offender social structures, and extra-legal governance. We narrow in on the concepts of violence and extra-legal governance in particular as they have been interpreted to hold significant differences for criminal groups operating in physical and digital domains. The paper argues that it is time to move on from criminological debates regarding whether organised cybercrime can exist to focus on the many rich questions that researchers can take from organised crime scholarship and apply to cyber-criminal groups. We put forward a reconceptualisation of organised cybercrime towards this end.

Journal of Criminology, 0(0). https://doi.org/10.1177/26338076231199793, Preprint 2023.

The Gozi group: A criminal firm in cyberspace?

By Jonathan Lusthaus, Jaap van Oss, and Philipp Amann

The relative glut of data on cybercriminal forums has led to a growing understanding of the functioning of these virtual marketplaces. But with a focus on illicit online trading, less attention has been paid to the structures of groups that carry out cybercrimes in an operational sense. In economic parlance, some such groups may be known as ‘firms’. This concept has been a significant part of the literature on more traditional forms of organised crime, but is not widely discussed in the cybercrime discourse. The focus of this article is, by way of a case study of the Gozi malware group, to explore the applicability of the concept of firms to the novel environment of cybercrime.

European Journal of Criminology, 20(5), 1701-1718. https://doi.org/10.1177/14773708221077615