Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Under the Radar: Corruption’s Role in Fueling Arms Diversion

By Michael Picard and Colby Goodman

As armed conflicts surge and organised crime activity rises, a new report from Transparency International Defence & Security (TI-DS) and Transparency International US (TI-US) reveals how corruption is quietly but consistently enabling weapons to fall into the wrong hands.

Under the Radar: Corruption’s Role in Fueling Arms Diversion investigates over 400 cases of diversion across 70 countries and shows how corruption, including bribery, embezzlement, and abuse of authority, serves as a key enabler of illicit arms flows.

The report’s release comes at a time of intensifying global concern over weapons diversion. It shows how corruption-fuelled diversion has empowered organised crime, fuelled armed conflict and violence, weakened military effectiveness, and undermined governance and security around the world.

“Despite greater recognition of corruption’s corrosive effect on arms control policies, corruption has often been sidelined in efforts to assess risks of arms diversion like a detective ignoring key clues in a recurring crime,” said Colby Goodman, Senior Researcher at TI US and TI-DS and one of the report’s authors. “Some states’ actions in recent years to add corruption risk assessments are a critical first step to better tackling this global scourge.”

The report provides critical information and tools for states to help identify and mitigate corruption-fuelled arms diversion as they develop new national arms control policies and engage in ongoing discussions within the United Nations on curbing arms diversion.

“The vast amounts of weapons diverted to terrorist groups in the past war on terror is a stark reminder of what happens when governments lose sight of corruption risks in the name of national security,” said Dr. Francesca Grandi, Head of Advocacy at Transparency International Defence & Security. “As demand for arms imports grows amid increasing global insecurity, this report offers practical and effective tools for arms exporting countries to strengthen integrity in their export control systems. It should also help spark more serious conversations globally, at the United Nations and in other fora, about sharing corruption-related information to prevent arms diversion.”

Some of the reports key findings include:

  • The theft or embezzlement of state-owned weapons for private gain is the most common type of corruption-fuelled diversion, accounting for over 350 cases. Bribery and abuse of authority remain a serious concern for diversion.

  • Corruption facilitates diversion at each stage of a weapon’s lifecycle, including production, international transfers, active use and storage, and disposal. The active use and storage stage had the most corruption-fuelled diversion cases followed by the disposal, international transfer, and production stages.

  • Many of the corruption-fuelled diversion cases resulted in devastating consequences for civilians. In more than 200 cases, military or security personnel reportedly colluded with illicit actors, such as insurgents or terrorists, in connection with arms diversion, which resulted in hundreds of deaths and injuries.

To address this urgent issue, the report offers key analysis and recommendations for states engaged in arms exports and imports:

  • Strengthen national policies by explicitly identifying corruption as a key risk for arms diversion and developing implementation guidelines that incorporate targeted risk assessment questions that measure key, often overlooked defence and security institutional controls.

  • Improve international collaboration on corruption in arms transfers by sharing information on corruption risks in arms transfers within the Arms Trade Treaty (ATT) framework and establishing working groups within the ATT and other multilateral for deeper discussions on the topic.

  • Support research and foreign aid to curb corruption-fuelled arms diversion, including funding studies on related issues and efforts to strengthen the integrity of defence and security institutions.

London: Transparency International, 2025. 50p.

Evaluability Assessment and Evaluation Options for an Elder Abuse Shelter Model

By Sierra Smucker, Jirka Taylor, Ivy Todd, Emily Hoch, Monique Martineau, Deven Clark, Meagan E. Cahill, Esther M. Friedman

s the number of older adults in the United States increases, there will be a corresponding increase in the need for services to prevent elder abuse and intervene in cases where it has already occurred. However, there are a limited number of evidence-based interventions to support victims of elder abuse. To encourage the rigorous evaluation of one intervention—Elder Abuse Shelters (EASs)—RAND researchers developed three research designs and assessed the preparedness of the well-established Weinberg Center's EAS in New York to undertake them. Researchers found that the Weinberg Center's EAS is well established, and the program model was organizationally and programmatically ready to be evaluated, though data collection practices should be strengthened before implementing the suggested evaluation designs. These evaluation designs could be generalized and implemented at EASs across the country as the number of shelters continues to grow.

Key Findings

The Weinberg Center's client numbers have fluctuated over time but are typically between 16 and 34 per year. Clients mostly identify as women, are ethnically and racially diverse, and are from the New York City area. Many clients have cognitive impairment and limited financial resources.

The COVID-19 pandemic corresponded with a decrease in the number of clients by decreasing potential clients' desire to stay in long-term care facilities and increasing turnover in referring agencies.

The Weinberg Center has a clear program logic model that connects inputs and outputs with measurable short- and long-term outcomes.

Organizationally and programmatically, the Center is ready to embark on an evaluation, with scores of 77 and 84 percent, respectively, in those areas of the evaluability assessment.

However, a low score for evaluation readiness of 43 percent, driven largely by currently insufficient data collection processes, indicates that the Center would need to strengthen its data collection capacity to complete a rigorous evaluation.

Three evaluation designs could help the Weinberg Center's EAS and other EAS models rigorously evaluate its impact: (1) a quasi-experimental design using non-random self-selection into the program, (2) a propensity score matching design that pairs clients with Adult Protective Services, and (3) a robust pre- and post-evaluation design.

When conducting an evaluation of an EAS, researchers must consider equity, data safety, and consent. The experience of elder abuse and the tools needed to help someone heal will differ across individuals depending on their background and cultural expectations.

Recommendation

Because the Weinberg Center is largely ready to embark on an evaluation, its leadership should review the proposed designs and consult with partners and potential evaluation teams as needed to decide how to proceed. Federal and state partners interested in protecting victims of elder abuse should consider funding one of these evaluation designs to determine whether EASs should be supported and encouraged to proliferate as the population ages.

Santa Monica, CA: RAND, 2023, 77p.

Wyoming Missing & Murdered Indigenous People Task Force 2025 Update

By Emily Grant, Lena Dechert

Wyoming is home to a little over 16,000 Indigenous residents, who make up nearly 3% of the state's population. However, Indigenous people in Wyoming continue to experience disproportionately high rates of homicide and disappearances compared to White residents. This means they go missing and are killed more often than their population size alone would predict. The Wyoming Missing and Murdered Indigenous Persons (MMIP) Task Force is dedicated to tracking and sharing data on these cases. This fifth-annual publication includes the latest available information on Indigenous homicide victims and missing persons in Wyoming, along with updates on efforts to improve law enforcement protocols for missing person cases.

Laramie: Wyoming Survey & Analysis Center, University of Wyomingm 2025. 7p.

Missing and Murdered Indigenous People: Wyoming Statewide Report

By Emily Grant, Lena Dechert, Laurel Wimbish, Andria Blackwood

HOMICIDE 105 Indigenous people (34 females, 71 males) were victims of homicide between 2000 and 2020. Indigenous homicide victims were 21% of the total homicide victims in Wyoming between 2000 and 2020. Between 2010 and 2019, the homicide rate per 100,000 for Indigenous people was 26.8, eight times higher than the homicide rate for White people. The homicide rate for Indigenous females was 15.3 per 100,000, 6.4 times higher than the homicide rate for White females. MISSING Between 2011 and September 2020, 710 Indigenous persons were reported missing. Some Indigenous people were reported missing more than once during the time period, resulting in a total of 1,254 missing person records for Indigenous people. Eighty-five percent were juvenile, and 57% were female. They were reported missing from 22 counties in Wyoming. Ten percent of missing Indigenous people are found within the same day they are reported missing, 50% are found within one week. One-fifth of the Indigenous people reported missing were missing for 30 or more days, which is a higher percentage than White people missing for 30 or more days (11%). Currently, 10 Indigenous people are listed as missing (3 females and 7 males). MEDIA COVERAGE Only 30% of Indigenous homicide victims had newspaper media coverage, as compared to 51% of White homicide victims. Indigenous female homicide victims had the least amount of newspaper media coverage (18%). MEDIA PORTRAYAL The newspaper articles for Indigenous homicide victims were more likely to contain violent language, portray the victim in a negative light, a nd provide less information as compared to articles about White homicide victim COMMUNITY BARRIERS Lack of trust in law enforcement and the judicial system, no single point of contact during an investigation, and lack of information during the investigation and after the final outcome were seen as barriers in the community related to the reporting and response to MMIP. RECOMMENDATIONS Develop consistent protocols and data systems for MMIPs to inform both law enforcement and families. Pay particular attention to documenting tribal affiliation in official records, coroner reports, and vital records. Create an Indigenous advocacy position/response team to help families navigate the reporting and investigation process. The advocate can serve as a communication point person, helping to reduce the emotional burden for families of repeating incident details to multiple agencies. Raise community awareness about the prevalence of MMIP, contributing risk and protective factors, and available resources. Distribute a list of community resources and efforts

Laramie: Wyoming Survey & Analysis Center University of Wyoming , 2021. 51p.

Decoding Crypto Crime: A Guide for Law Enforcement

By The Organization for Security and Co-operation in Europe

The Organization for Security and Co-operation in Europe (OSCE) is proud to release a practical resource designed to empower law enforcement officers, prosecutors, and stakeholders in tackling cryptocurrency-related crimes. The guide "Decoding Crypto Crime: A Guide for Law Enforcement" simplifies complex concepts like blockchain technology and virtual assets, offering best practices for investigating common crypto crimes such as investment scams, extortion, and phishing.

It provides actionable steps for collecting critical evidence, interacting with Virtual Asset Service Providers (VASPs), and utilizing blockchain analytics tools. Recognizing the challenges victims face, the guide also offers support strategies and emphasizes the importance of cross-jurisdictional collaboration. While not exhaustive, this guide serves as a foundational tool to bridge the knowledge gap and enhance law enforcement’s ability to navigate the rapidly evolving world of crypto crime. Download the guide today to strengthen your capacity to combat digital financial crime and ensure a safer digital landscape.

Prague: OSCE, 2025. 64p.

Intimate Partner and Domestic Violence: EIGE’s Data Collection (2023–2024) Methodological Report

By The European Institute for Gender Equality (EIGE)

Introduction The European Institute for Gender Equality (EIGE) has developed 13 indicators on intimate partner violence and domestic violence to guide the data collection efforts of the police and the justice sector. EIGE’s indicators support EU Member States to measure intimate partner violence and domestic violence and to assess the progress made to combat and monitor these forms of violence. Ultimately, the indicators enhance the comparability of national administrative data on intimate partner and domestic violence in alignment with the minimum requirements of Directive (EU) 2024/1385 on combating violence against women and domestic violence; Directive 2012/29/EU on establishing minimum standards on the rights, support and protection of victims of crime; and the Council of Europe convention on preventing and combating violence against women and domestic violence (the Istanbul Convention). Between 2018 and 2020, EIGE used the 13 indicators to measure intimate partner violence across the EU. Between 2021 and 2022, EIGE revised and simplified the 13 indicators, the data collection tool used to populate the indicators and the data collection methodology. Between 2023 and 2024, EIGE conducted a new EU-wide data collection exercise to measure intimate partner violence and domestic violence using the updated indicators, data collection tool and methodology. This document describes the methodological approach for the 2023–2024 data collection exercise. The structure of this report is as follows. • The following section provides an overview of EIGE’s data collection exercise, indicators and data collection tool and provides general methodological details. • The remaining sections provide indicator-specific details on the methodological approach used to collect data on EIGE’s 13 indicators on intimate partner violence and domestic violence. • The annexes present mapping tables with further information on the availability and comparability of the data collected, and the sources of the data.

Luxembourg: Publications Office of the European Union, 2025, 152p.

Towards Integrated Child Protection Systems: Challenges, Promising Practices, and Ways Forward

By The European Union Agency for Fundamental Rights

This report presents the findings of research conducted by the European Union Agency for Fundamental Rights (FRA) on existing child protection systems across all EU Member States. The 27 national reports, commissioned from Franet, the agency’s multidisciplinary research network, are available online on the agency’s website. These reports offer a wealth of additional data beyond what is included here. In April 2024, the European Commission adopted a Recommendation on developing and strengthening integrated child protection systems in the best interests of the child. It calls on authorities at all levels of government, civil society and other stakeholders to cooperate to protect children from violence by means of better-integrated systems. Its aim is to enforce a ‘culture of zero-tolerance for violence against children’ (recital 7) while also emphasising ‘Child protection as a global priority of the Union’ (p. 21). In developing the Recommendation, the Commission consulted children by means of the EU Children’s Participation Platform, and more than 1 000 children provided their views. Based on these data and the Commission Recommendation, this report suggests practical me

Vienna: European Union Agency for Fundamental Rights ,2025. 118p.

Crypto, Corruption, and Capital Controls: CrossCountry Correlations 

By Marwa Alnasaa, Nikolay Gueorguiev, Jiro Honda, Eslem Imamoglu, Paolo Mauro, Keyra Primus, and Dmitriy Rozhkov 

  The emergence of crypto-assets (private digital assets that depend primarily on cryptography and distributed ledger technology for record keeping) has unleashed a plethora of financial innovation that will likely revolutionize the form of money and the ways it is used. These developments create opportunities as well as risks. As noted, for example, by a group of G-20 policymakers, “…technological innovation, including that underlying crypto-assets, has the potential to improve the efficiency and inclusiveness of the financial system and the economy more broadly,” but “crypto-assets […] raise issues with respect to consumer and investor protection, market integrity, tax evasion, money laundering and terrorist financing.” The pseudonymity of crypto-assets (whereby transactions require only digital identities) makes them a potential vehicle for illicit flows, including flows of proceeds from corruption. This pseudonymity is not an intrinsic feature of the underlying technology, but rather a choice made in the design and practice of most currently existing crypto-assets. Whereas cash provides full anonymity and large denomination bills have long been considered an aid for crime and tax evasion (Rogoff 2017, Chodorow-Reich et al. 2020), crypto-assets in their current form make it possible to move even larger amounts speedily and with greater ease, including across national borders (Graf von Luckner et al., 2021). As crypto-assets rapidly gain macroeconomic relevance (International Monetary Fund 2021) and policymakers consider the optimal degree of regulation, it is urgent to bring empirical evidence to bear on the question of whether crypto-assets facilitate corruption. Likewise, it is helpful to explore the extent to which crypto-assets are used to circumvent capital controls, for countries where these are in place, and whether crypto-assets are more likely to gain traction in countries where the local currency has historically not been a secure store of value. There are also potential benefits of the technologies that crypto-assets are based on. In particular, prudently designed central bank digital currencies could offer additional resilience, safety and availability with lower costs. These technologies could also be used to improve transparency and record-keeping for procurement or other payments related to government projects, thereby increasing accountability, and reducing the scope for corruption. Likewise, property and registry systems could be enhanced, reducing red tape, and streamlining processes. However, these initiatives are currently less advanced or widespread than crypto-assets. Empirical investigation of the factors underlying the growing usage of crypto-assets is in its infancy, owing to data limitations. In this paper, we present a simple cross-country analysis drawing on recently released survey-based data. We explore the correlation of crypto-asset usage with indicators of corruption, capital  controls, a history of high inflation, and other factors. We find that crypto-asset usage is significantly and positively associated with corruption and capital controls. Whereas the small sample size and uncertain quality of the data on crypto-assets implies that our results must be interpreted with caution, it is also worth recalling that measurement error tends to reduce the likelihood of finding a significant empirical association; significant results with low-quality data are thus worth paying attention to. With these caveats in mind and considering the urgency of acting before it is too late, rather than waiting for conclusive evidence, we believe that, on balance, our results add to the case for regulating crypto-assets, including know-your-customer approaches, as opposed to taking a laissez-faire stance. 

Washington, DC: International Monetary Fund, 2022. 19p.

A Rough Cut Trade: Africa’s Coloured-Gemstone Flows to Asia

By Marcena Hunter and Lynda Lawson

Known for their beauty, coloured gemstones have been used in jewellery, to adorn clothing and in religious ceremonies for centuries. Fuelled by demand from jewellers and investors, the coloured gemstone sector is an international trade linking supply countries in Africa and traders in Thailand and elsewhere in Asia. Today, there are more than 50 source countries and over a hundred gemstone varieties. In 2015, a conservative estimate of the global annual market for rough coloured gemstones – the term used to describe uncut, unpolished stones – valued the sector at between US$17 billion and US$23 billion. Africa is a prominent supplier of gemstones, which are shipped across the Indian Ocean to Asia for beneficiation. Rough coloured gemstones are mined throughout Africa, largely by artisanal and small-scale mining (ASM) operators. Small-scaling mining will continue to be a vital source of gemstones for the international market because many gem deposits are small, which means they are short-lived and therefore not appropriate for large-scale mining operations. From Africa, the rough stones are shipped mainly to Thailand, India and Sri Lanka, which are home to long-established, traditional processing centres, and are the main global hubs for cutting and polishing stones for the global retail market. China is also expanding its market share of this industry through increasing use of machine cutting (a process traditionally done manually). Dubbed the ‘ruby trading kingdom’, Thailand is one of the world’s major processing centres for coloured gemstones. The country has been the world’s leading exporter of precious coloured gemstones for the last eight years consecutively,5 with overall exports in 2017 valued at US$1.9 billion. Thailand plays an especially prominent role in ruby and sapphire supply chains. The Thai gemstone industry is known to be heavily dependent on African rough coloured gemstones (see the map); however, official trade records fail to reflect the immense scale of the trade. This is because of the clandestine nature of flows, which are of both an informal and illegal nature. Most African coloured gemstones are moved undeclared through informal channels or are under-declared in official channels. African rough-gemstone traders play a significant role in these supply chains, and have been able to exploit their knowledge of the gemstone industry, as well as their close social and ethnic networks, to buy and export stones from Africa to Asia with ease. In Thailand it is openly acknowledged that the country’s import figures for coloured gemstones from Africa are underreported. For example, according to participants in this research, Madagascar has been an important source of sapphires and other gemstones supplying the Thai industry for over 20 years. After the discovery of brilliant-blue sapphires in the 1990s, numerous gem rushes ensued and Madagascar became the centre of the sapphire universe, but has only recently started to be included as a source country in official Thai trade records. The informal nature of the coloured-gemstone trade, combined with the inherent difficulty in valuing rough stones at the site of extraction, provides ample opportunity for criminal and corrupt actors to exploit and profit from it. This includes large-scale smuggling of stones, resulting in significant underreporting of export and trade figures. Based on Thai trade figures and estimates of authorities and stakeholders, there is a strong likelihood that hundreds of millions of dollars of coloured gemstones are smuggled annually from Africa to Thailand. According to authorities and those engaged in the trade, coloured gemstones may also be being used in money-laundering schemes.

Geneva: Global Initiative Against Transnational Organized Crime (GI-TOC) 2020. 56p.

Community Resilience to Extortion: : Insights from El Salvador, Guatemala and Honduras

By Lester Ramirez Irias

This report seeks to understand how communities in El Salvador, Guatemala and Honduras build and sustain their resilience to extortion, especially in light of state-led anti-extortion measures under emergency regimes in El Salvador and Honduras. It examines how community resilience manifests in environments plagued by violence and organized crime, particularly where gangs operate alongside public security forces under emergency regimes or mano dura (‘iron fist’) policies. Through six case studies, the report explores the varying contexts of community resilience, the factors contributing to its development and long-term sustainability, and the communities' capacity to absorb the impacts of criminal governance, adapt, and transform their environments. The findings reveal a shifting risk landscape for communities. Under emergency regimes, while the incidence of extortion and homicides has decreased, there has been an increase in restrictions on fundamental rights and freedoms. These restrictions complicate community resilience, as the state – expected to provide public security and protect human rights – has become an enabler of impunity. The case studies highlight different forms of resilience, driven by diverse actors such as women victims of extortion, private sector organizations, and foundations promoting sports and community development. While not fully representative of each country, these case studies offer valuable insights into community resilience in high-violence and emergency contexts. Main findings § Emergency regimes have negatively impacted community resilience in El Salvador and Honduras. Each country has unique characteristics in how emergency regimes or ‘iron fist’ measures are implemented, driven by their respective governments. In El Salvador, community resilience is undermined by an emergency regime that has become entrenched as state policy, weakening communities' ability to resist and recover from threats. In Honduras, community resilience faces a dual challenge: criminal networks that once profited from extortion now operate legitimate businesses within communities, making it difficult to identify and manage threats. § Private sector-led initiatives are proving effective. Activities organized by the private sector, such as those by sugar associations in El Salvador and traders in Guatemala, have been effective in building and maintaining community resilience. The private sector’s ability to provide financial resources, along with its organization, leadership and influence over governments, has been crucial in reducing the risks posed by organized crime and transforming environments. However, as seen in the Honduras case study below, mistrust, fragmented initiatives and a highly uncertain context have hindered sustained collaboration between organized entrepreneurs and the police. § Organized sports contribute positively to community resilience. Participation in organized sports has been a key strategy for building resilience in the communities of La Bethania in Guatemala and Chamelecón in Honduras. Sports foster social cohesion by involving not only young people but also parents, coaches and other adults who serve as positive role models. It also offers young people a safe space and instils life values that extend beyond the playing field. § Corruption within the state significantly hampers resilience efforts. Corruption has a detrimental impact on the sustainability and effectiveness of community resilience initiatives. In El Salvador, for example, as extortion by gangs has decreased, police corruption has emerged as a new form of extortion. Unchecked corruption erodes public trust in institutions, allows organized crime to infiltrate state structures and excludes vulnerable groups such as women. § Sexual extortion and impunity obstruct the development of resilience. Under emergency regimes, sexual violence by state actors often receives institutional backing, with arbitrary detention threats becoming commonplace. Victims face severe psychological and social consequences, including stigma and revictimization. The normalization of sexual violence within communities exacerbates these issues, leaving women feeling unprotected and isolated. Mistrust of authorities and fear of reprisals further hinder the community’s ability to organize and respond collectively to such abuses.

Geneva, SWIT: Global Initiative Against Transnational Organized Crime , 2024. 25p.

STRENGTHENING RESILIENCE AGAINST EXTORTION: A COMMUNITY-LED APPROACH IN CENTRAL AMERICA

By Ana Castro

The "Strengthening Resilience Against Extortion: A Community-Led Approach in Central America" project, implemented from January to July 2024, aimed to enhance community resilience against extortion in Guatemala, Honduras, and El Salvador. This initiative, led by GI-TOC and its partners, focused on empowering local communities through research, capacity-building activities, and active dialogues, fostering collaboration among civil society, academia, and law enforcement. The project delivered several key outcomes:  Policy Brief: A comprehensive assessment of community responses to extortion under the State of Exception in the target countries. This brief provided detailed analysis and recommendations, addressing the effectiveness of community resilience over time.  Updated Manual: The existing manual on community responses against extortion was enhanced with a new chapter on Victim Support. This updated resource was used extensively in nine capacity-building workshops conducted across the three countries.  Capacity-Building Workshops: Nine workshops were held, three in each country, training a total of 233 participants (157 females, 76 males). These workshops aimed to deepen the understanding of community responses to extortion and strengthen local capacities.  Resilience Dialogues: Four virtual and one in-person meeting facilitated active dialogue among stakeholders. These dialogues led to the development of three anti-extortion mechanisms: an interinstitutional roundtable on gender approaches, recommendations for preventing extortion risks, and an advocacy plan for telecommunication protection laws. Throughout the project, several challenges were encountered, including fear and resistance from community members, lack of updated comparative statistics, and alleged corruption within law enforcement. These obstacles highlighted the need for building trust, ensuring confidentiality, and providing mental health support. The lessons learned emphasized the importance of comprehensive security approaches, applying gender and intersectional analyses, and fostering collaboration between civil society and government. To sustain and enhance these efforts, future support should focus on strengthening community structures, advocating for balanced policies that protect human rights, establishing mental health support programs, and promoting comprehensive security measures that go beyond military interventions. Additionally, continuous training in digital security, mental health first aid, and legal rights is essential for empowering communities against evolving threats. Public-private partnerships and international awareness campaigns are also crucial for addressing the root causes of extortion and violence in the region. By implementing these recommendations, communities in El Salvador, Guatemala, and Honduras can build more resilient and secure environments, effectively combatting the pervasive issue of extortion.  

Geneva: Global Initiative Against Transnational Organized Crime. 2024. 21p.

Mapping the risk of serious and organised crime infiltrating legitimate businesses: Final report

Edited by Shann Hulme, Emma Disley and Emma Louise Blondes  

The economic and social harms from serious and organised crime (SOC) are multifaceted and wide-reaching, and span the individual, community and societal level. Appropriate targeting of resources to tackle SOC relies upon accurate information about the extent and nature of the phenomenon. However, the hidden nature of SOC means that measuring its size and scale is inherently challenging. The European Commission, DG Migration and Home Affairs, called for a study ‘Mapping the risk of serious and organised crime infiltrating legitimate businesses’ to improve the evidence-base in relation to SOC in the EU.

Brussels: European Commission, 2021. 166p.

Organized Crime and Gender: issues relating to the United Nations Convention Against Transnational Organized Crime

UNODC released an Issues Paper on Organized Crime and Gender in May 2022 which focused on gender mainstreaming in the implementation of the United Nations Convention against Transnational Organized Crime. One of the key takeaways from the paper is that gender mainstreaming is not a parallel effort or a “women’s issue” separate from the implementation of the Organized Crime Convention but that it is an integral part of full implementation of the Convention. By not mainstreaming gender into legislation, policies and practices to combat organized crime, this can jeopardize the effective implementation of the convention and be counterproductive to preventing and combating organized crime.

Vienna: United Nations Office on Drugs and Crime, 2022. 64p.

Seizing the opportunity: 5 recommendations for crypto assets-related crime and money laundering

By Europol

These recommendations follow the 6th Global Conference on Criminal Finances and Cryptocurrencies on 1–2 September 2022. The conference was hosted by Europol at its headquarters in The Hague, the Netherlands, together with the Basel Institute on Governance through the Joint Working Group on Criminal Finances and Cryptocurrencies.

The Recommendations are intended to highlight broad approaches and best practices. They are designed to help public and private actors stay one step ahead of those seeking to abuse crypto assets (also known as virtual assets) and services to make, hide and launder illicit money.

The main message is that as the use of crypto assets expands into practically every country and sector, so does its abuse to commit new forms of crime and launder criminal proceeds. Yet with the right tools, capacity and cooperation, the unique characteristics of blockchain-based technologies offer an unprecedented opportunity to investigate organised crime and money laundering networks and to recover stolen funds.

The five recommendations cover:

  1. Breaking down silos between “traditional” and “crypto”

  2. Regulating broadly and make full use of existing laws 

  3. Taking advantage of the blockchain to disrupt organised crime 

  4. Raising crypto literacy through capacity building and clear communication 

  5. Increasing public-private cooperation

Europol and Basel Institute on Governance, 2022.  6p.

Cybercrime Classification and Measurement

By National Academies of Sciences, Engineering, and Medicine.

Cybercrime poses serious threats and financial costs to individuals and businesses in the United States and worldwide. Reports of data breaches and ransomware attacks on governments and businesses have become common, as have incidents against individuals (e.g., identity theft, online stalking, and harassment). Concern over cybercrime has increased as the internet has become a ubiquitous part of modern life. However, comprehensive, consistent, and reliable data and metrics on cybercrime still do not exist - a consequence of a shortage of vital information resulting from the decentralized nature of relevant data collection at the national level.

Cybercrime Classification and Measurement addresses the absence credible cybercrime data and metrics. This report provides a taxonomy for the Federal Bureau of Investigation for the purpose of measuring different types of cybercrime, including both cyber-enabled and cyber-dependent crimes faced by individuals and businesses, and considers the needs for its periodic revision. 

Washington DC: National Academies Press, 2025. 259p.

Commodified Sexual Interactions Involving Minors; Evolving dynamics in technology-facilitated child sexual exploitation

By Thorn in partnership with Burson Insights, Data & Intelligence

Since 2019, Thorn has focused on amplifying youth voices to better understand their digital lives, with particular attention to how they encounter and navigate technology-facilitated forms of sexual abuse and exploitation. Previous youth-centered research has explored topics such as child sexual abuse material (CSAM) — including that which is self-generated (“SG-CSAM”) — nonconsensual resharing, online grooming, and the barriers young people face in disclosing or reporting negative experiences. In recent years, young people have been encountering sexual interactions involving money and other items of value in their digital lives at an alarming rate, and may, at times, be advertising personal imagery. Technology has previously been recognized as a key enabler in the commercial sexual exploitation of children (CSEC) — facilitating unprecedented access to minors, enabling novel “advertising” models, introducing new forms of abuse (e.g., live-streamed child sexual exploitation), and strengthening illicit market networks for CSAM. However, the apparent commodification of sexual interactions involving minors, without clear third-party facilitator, points to an evolution within technology-facilitated forms of sexual exploitation.

Thorn explored this new development as part of its recent Emerging Threats to Young People survey, which examines emergent online risk areas to better understand how current technologies create and/ or exacerbate child safety vulnerabilities and to identify areas where solutions are needed. This report sheds light on some of the ways in which the intersection of technology and romantic or sexual relationships impacts young people and increases their risk for exploitative interactions. These risks include commodified and/or commercial exchanges for nude imagery and/or involvement in sexual acts. Other reports from the series address additional issues, including the emergence of deepfake nudes6 and the evolving nature of sextortion.7 Drawing on responses from a survey of 1,200 young people aged 13-20, this report examines their lived experiences with technology-facilitated sexual solicitations and involvement in commodified exchanges. Three key findings emerged from this research:. It’s common for young people to receive sexual solicitations8 online, often after only a brief period of connection between users. One in 3 (36%) young people reported they had received a solicitation to send sexual imagery of themselves from an online-only contact while they were under the age of 18. Most (79%) of these solicitations were received within a week or less of connecting with the other user.

For some young people, technology-facilitated sexual experiences have been commodified, with young people receiving both monetary and non-monetary (e.g., social opportunities) forms of compensation. One in 7 (15%) young people reported engaging in at least one form of transactional sexual experience while under the age of 18. And 33% of those who had indicated they received social opportunities, like invites to parties or more online followers, as part of their compensation. . Markets for the commercial sexual exploitation of children appear to be expanding, driven, in part, by emerging buyer dynamics that capitalize on vulnerabilities linked to technology-facilitated sexual exploration among young people. Among young people who had a commodified sexual experience as a minor, 25% indicated they never received a solicitation to sell their content, 59% indicated they exclusively knew their buyers online, and 42% indicated they had a buyer who was another minor.

El Segundo, CA: Thorn, 2025. 33p.

Domestic Abuse and Child Contact: The Interface Between Criminal and Civil Proceedings

By Michele Burman | Ruth Friskney | Jane Mair | Richard Whitecross 

This Report presents the findings of the Domestic Abuse and Child Contact: The Interface Between Criminal and Civil Proceedings research project, funded by the Scottish Government. The study set out to examine the relationship between civil and criminal law in the context of child contact proceedings which raise issues of domestic abuse. The impetus behind the study is to better understand how, if at all, developments in domestic abuse proceedings and changing definitions in the context of criminal law in Scotland, inform the handling of child contact cases which are conducted within the scope of civil justice. Scotland has seen several major policy and legislative developments aimed at reforming responses to domestic abuse, most recently the introduction of the Domestic Abuse (Scotland) Act 2018. These developments have been primarily situated within the context of criminal law and the criminal justice process. There has been relatively less attention paid to civil law. The negative impact of domestic abuse on children is well-recognised in Scotland (see, e.g., Callaghan et al 2018). Growing awareness of the nature and impact of domestic abuse is reflected to some extent in the explicit statutory obligations, introduced by the Family Law (Scotland) Act 2006, on the civil courts to consider domestic abuse in the context of actions for child contact. In further recent debate and reform of child law and family justice, domestic abuse has been highlighted and children placed at the heart of the decision-making process. Decisions in respect of child contact generally, and in particular where there are allegations of domestic abuse, continue to present significant challenges. Relatively little is known of how these provisions of Scots family law work in practice; of the extent to which the treatment of domestic abuse in the civil courts reflects criminal practice, or of the ways in which individual child contact cases may (or may not) interact with criminal justice proceedings. How child contact, more generally, works in practice in Scotland, is an under-researched area with Wilson and Laing’s (2010) study a rare exception. The significance of the interaction of the criminal and the civil, in the context of domestic abuse and child contact, was clearly identified by the Scottish Government in the commissioning of a significant scoping project: Contact Applications Involving Allegations of Domestic Abuse: Feasibility Study (McGuckin & McGuckin 2004) but the planned Phase 2 did not follow. Much of the research evidence we have on this specific issue in Scots family law derives from two doctoral theses (Mackay 2012; Morrison 2014). Overall, there is limited research evidence on the operation of family law in child contact cases, and whether and how the interpretation and application of the civil law statutory provisions are informed by contemporary understandings of domestic abuse and changing definitions or practices in the criminal law. The research which has been published has consistently stressed the need for further, large scale (e.g., McGuckin & McGuckin 2004; Wilson & Laing 2010) and longitudinal study (e.g., Mays & Christie 2001). Through a focus on the interrelationship between the investigation and prosecution of domestic abuse in criminal justice and parallel child contact proceedings advancing through civil justice processes, this research study contributes to addressing the current knowledge gap. The key stated aims of the study are: a. to understand the ways in which domestic abuse proceedings may inform the handling of and decision-making in child contact cases; b. to explore family law practitioner understandings of the impact and relevance of a course of conduct of domestic abuse and its implication in contact cases under s.11 7A – C of the Children (Scotland) Act 1995; c. to identify and explain perceived impediments or obstacles to communication and information exchange in such cases; and d. to examine the links or lack thereof between domestic abuse criminal proceedings and Child Welfare Hearings (contact). 

Edinburgh: Scottish Civil Justice Hub, Scottish Centre for Crime & Justice Research, 2022. 78p.

A Growing Threat? Online Child Exploitation and abuse in Ghana, Côte d’Ivoire and Cape Verde

By Thi Hoang and Livia Wagner

This report examines the prevalence of online child sexual exploitation and abuse (OCSEA) in West Africa, specifically in Ghana, Côte d’Ivoire and Cape Verde, highlighting key risk factors. Data on OCSEA is scarce due to under-reporting and weak reporting mechanisms, but preliminary data indicates an acceleration in uploads since 2019. Case studies in Côte d’Ivoire, Ghana and Cape Verde reveal gaps and shortcomings in victim identification, protection and prosecution. Urgent action is required to prevent devastating consequences for individuals in West Africa. Key points l Risk factors for OCSEA are prevalent and increasing across the ECOWAS region. l Limited evidence exists regarding the regional prevalence and trends of OCSEA, but preliminary findings suggest that it is more widespread than official data indicates. l Global trends indicate that regions with weak OCSEA identification processes and under-reporting tend to have higher prevalence of OCSEA. l Addressing the challenges of detection, investigation, prosecution and victim support requires sustained political will and greater prioritisation of OCSEA in the policy agenda. l This is an opportune moment for ECOWAS states to take action and implement practical measures to prevent the expansion of OCSEA and strengthen identification and follow-up processes 

OCWAR-T Research Report 7 | August 2023, ENACT Africa, 2023. 48p.

Violence against family animals in the context of intimate partner violence

By Kylie Butler and Jasmine B. MacDonald

This policy and practice paper describes what we know about the relationship between intimate partner violence (IPV) and violence against family animals. It covers: (a) the forms of violence against family animals in an IPV context; (b) why perpetrators of IPV use violence against family animals; (c) how violence against family animals affects victim-survivors; and (d) implications for practice including tips for supporting clients who may be experiencing violence against family animals in an IPV context. Key messages ƒ Some evidence suggests that violence against family animals may be an indicator of frequent and severe IPV patterns. ƒ Perpetrators may threaten, harm or kill family animals with an intention to control victimsurvivors, cause emotional distress and/or control animals. ƒ Violence against family animals has negative effects on the physical and psychological wellbeing of victim-survivors, including children and family animals. ƒ Many victim-survivors report staying with, delaying leaving or returning to perpetrators due to fears for the safety of family animals left with the perpetrator. ƒ Actions at the practitioner, service and systemic levels to strengthen support for victimsurvivors of IPV who have experienced violence against family animals include: − screening for violence against family animals and providing support with animal-inclusive safety planning − increasing access to animal-inclusive crisis accommodation ƒ strengthening relationships between IPV support services, animal welfare services and law enforcement

Southbank VIC 3006 Australia Australian Institute of Family Studies, 2024. 16p

Pathways to Safety: An Examination of Federal and State-Level Barriers and Facilitators to Elder Abuse Reporting and Response

By Kristin Lees Haggerty; Olanike Ojelabi; Randi Campetti; Kathy Greelee

The authors of this paper report on a research project aimed at addressing unreported cases of elder abuse, and specifically exploring what guidance policy and decision-makers need in order to address barriers to reporting. Specifically, the authors’ research sought to improve understanding of elder abuse reporting pathways, facilitators, barriers, and outcomes. Over the course of their research, the authors report achieving three main objectives: conducting an environmental scan of policies and practices across states; conducting an in-depth case study of policy changes made in the state of Massachusetts; and developing recommendations for improving communication between Adult Protective Services (APS) and reporters based on findings from the first two objectives. The project was guided by two main research questions: what the legal, ethical, and practical barriers and facilitators are to establishing feedback loops about reported cases of potential elder abuse; and how regulations are interpreted and put into practice at the state and local levels in Massachusetts. The authors discuss their research design, methods, and analytical data analysis techniques, expected applicability of the research, limitations, outcomes, and recommendations.

Waltham, MA: Education Development Center, 2023. 67p.